[PDF][PDF] Zcash protocol specification
D Hopwood, S Bowe, T Hornby, N Wilcox - GitHub: San Francisco, CA …, 2016 - zeccoin.net
Zcash is an implementation of the Decentralized Anonymous Payment scheme Zerocash,
with security fixes and improvements to performance and functionality. It bridges the existing …
with security fixes and improvements to performance and functionality. It bridges the existing …
A survey of the elliptic curve integrated encryption scheme
V Gayoso Martínez, L Hernández Encinas… - 2010 - digital.csic.es
Elliptic Curve Cryptography (ECC) is a relatively recent branch of cryptography based on the
arithmetic of elliptic curves and the Elliptic Curve Discrete Logarithm Problem (ECDLP) …
arithmetic of elliptic curves and the Elliptic Curve Discrete Logarithm Problem (ECDLP) …
Design of cross-plane colour image encryption based on a new 2D chaotic map and combination of ECIES framework
D Li, J Li, X Di, B Li - Nonlinear Dynamics, 2023 - Springer
Chaotic systems are suitable for protecting digital images due to many of their own
characteristics. However, many chaos-based image colour encryption algorithms exhibit …
characteristics. However, many chaos-based image colour encryption algorithms exhibit …
Elliptic curve cryptography considerations for securing automation and SCADA systems
A Tidrea, A Korodi, I Silea - Sensors, 2023 - mdpi.com
Securing critical infrastructures and manufacturing plants in the Industrial-Internet-Of-Things
and Industry 4.0 is a challenge today due to the increased number of attacks against …
and Industry 4.0 is a challenge today due to the increased number of attacks against …
A novel asymmetric hyperchaotic image encryption scheme based on elliptic curve cryptography
Most of the image encryption schemes based on chaos have so far employed symmetric key
cryptography, which leads to a situation where the key cannot be transmitted in public …
cryptography, which leads to a situation where the key cannot be transmitted in public …
Analysing the HPKE standard
Abstract The Hybrid Public Key Encryption (HPKE) scheme is an emerging standard
currently under consideration by the Crypto Forum Research Group (CFRG) of the IETF as a …
currently under consideration by the Crypto Forum Research Group (CFRG) of the IETF as a …
Vision paper: Do we need to change some things? Open questions posed by the upcoming post-quantum migration to existing standards and deployments
P Kampanakis, T Lepoint - International Conference on Research in …, 2023 - Springer
Cryptographic algorithms are vital components ensuring the privacy and security of
computer systems. They have constantly improved and evolved over the years following …
computer systems. They have constantly improved and evolved over the years following …
Reviving instruction set randomization
K Sinha, VP Kemerlis… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Instruction set randomization (ISR) was proposed early in the last decade as a
countermeasure against code injection attacks. However, it is considered to have lost its …
countermeasure against code injection attacks. However, it is considered to have lost its …
Comparative study on the performance of elliptic curve cryptography algorithms with cryptography through RSA algorithm
NJG Saho, EC Ezin - CARI 2020-Colloque Africain sur la Recherche en …, 2020 - hal.science
Encryption method is an effective way to guarantee the confidentiality and in other ways
(digital signature) the authenticity of data. The use of the digital signature derives from the …
(digital signature) the authenticity of data. The use of the digital signature derives from the …
PQ-HPKE: post-quantum hybrid public key encryption
M Anastasova, P Kampanakis, J Massimo - Cryptology ePrint Archive, 2022 - eprint.iacr.org
Public key cryptography is used to asymmetrically establish keys, authenticate or encrypt
data between communicating parties at a relatively high performance cost. To reduce …
data between communicating parties at a relatively high performance cost. To reduce …