[PDF][PDF] Zcash protocol specification

D Hopwood, S Bowe, T Hornby, N Wilcox - GitHub: San Francisco, CA …, 2016 - zeccoin.net
Zcash is an implementation of the Decentralized Anonymous Payment scheme Zerocash,
with security fixes and improvements to performance and functionality. It bridges the existing …

A survey of the elliptic curve integrated encryption scheme

V Gayoso Martínez, L Hernández Encinas… - 2010 - digital.csic.es
Elliptic Curve Cryptography (ECC) is a relatively recent branch of cryptography based on the
arithmetic of elliptic curves and the Elliptic Curve Discrete Logarithm Problem (ECDLP) …

Design of cross-plane colour image encryption based on a new 2D chaotic map and combination of ECIES framework

D Li, J Li, X Di, B Li - Nonlinear Dynamics, 2023 - Springer
Chaotic systems are suitable for protecting digital images due to many of their own
characteristics. However, many chaos-based image colour encryption algorithms exhibit …

Elliptic curve cryptography considerations for securing automation and SCADA systems

A Tidrea, A Korodi, I Silea - Sensors, 2023 - mdpi.com
Securing critical infrastructures and manufacturing plants in the Industrial-Internet-Of-Things
and Industry 4.0 is a challenge today due to the increased number of attacks against …

A novel asymmetric hyperchaotic image encryption scheme based on elliptic curve cryptography

H Liang, G Zhang, W Hou, P Huang, B Liu, S Li - Applied Sciences, 2021 - mdpi.com
Most of the image encryption schemes based on chaos have so far employed symmetric key
cryptography, which leads to a situation where the key cannot be transmitted in public …

Analysing the HPKE standard

J Alwen, B Blanchet, E Hauck, E Kiltz, B Lipp… - … Conference on the …, 2021 - Springer
Abstract The Hybrid Public Key Encryption (HPKE) scheme is an emerging standard
currently under consideration by the Crypto Forum Research Group (CFRG) of the IETF as a …

Vision paper: Do we need to change some things? Open questions posed by the upcoming post-quantum migration to existing standards and deployments

P Kampanakis, T Lepoint - International Conference on Research in …, 2023 - Springer
Cryptographic algorithms are vital components ensuring the privacy and security of
computer systems. They have constantly improved and evolved over the years following …

Reviving instruction set randomization

K Sinha, VP Kemerlis… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Instruction set randomization (ISR) was proposed early in the last decade as a
countermeasure against code injection attacks. However, it is considered to have lost its …

Comparative study on the performance of elliptic curve cryptography algorithms with cryptography through RSA algorithm

NJG Saho, EC Ezin - CARI 2020-Colloque Africain sur la Recherche en …, 2020 - hal.science
Encryption method is an effective way to guarantee the confidentiality and in other ways
(digital signature) the authenticity of data. The use of the digital signature derives from the …

PQ-HPKE: post-quantum hybrid public key encryption

M Anastasova, P Kampanakis, J Massimo - Cryptology ePrint Archive, 2022 - eprint.iacr.org
Public key cryptography is used to asymmetrically establish keys, authenticate or encrypt
data between communicating parties at a relatively high performance cost. To reduce …