Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey

S Ullah, J Zheng, N Din, MT Hussain, F Ullah… - Computer Science …, 2023 - Elsevier
Elliptic Curve (EC) is the most recent and advanced technique of Elliptic Curve
Cryptography (ECC). EC is often used to improve the security of open communication …

A perspective trend of hyperelliptic curve cryptosystem for lighted weighted environments

S Ullah, Z Jiangbin, MT Hussain, N Din, F Ullah… - Journal of Information …, 2022 - Elsevier
Abstract In modern cryptography, Light Weighted Environments (LWE) refer to low-
constrained environments (Pelzl et al., 2003) such as smartphones and other electronic …

[HTML][HTML] Certificateless anti-quantum blind signcryption for e-cash

H Yu, Q Zhang, L Li - Journal of Industrial Information Integration, 2024 - Elsevier
Electronic cash (e-cash) has become major payment way in the era of internet of things.
However, the leakage of user privacy and transaction data is becoming more and more …

A Comparative Study of Elliptic curve and Hyperelliptic Curve Cryptography Methods and an Overview of Their Applications

A Yadav, P Sharma, Y Gigras - 2024 International Conference …, 2024 - ieeexplore.ieee.org
The significance of cybersecurity in today's highly technological era cannot be overstated.
With the advancement of modern technologies, various security measures have been …

[PDF][PDF] Text encryption using pell sequence and elliptic curves with provable security

S Azhar, NA Azam, U Hayat - Comput. Contin, 2022 - researchgate.net
The demand for data security schemes has increased with the significant advancement in
the field of computation and communication networks. We propose a novel three-step text …

An Efficient Multidocument Blind Signcryption Scheme for Smart Grid‐Enabled Industrial Internet of Things

AM Abdullah, I Ullah, MA Khan… - Wireless …, 2022 - Wiley Online Library
The smart grid‐enabled industrial Internet of Things (SG‐IIoT) is a hybrid data
communication network connected with the power grid that collects and analyzes data from …

A typology of secure multicast communication over 5 G/6 G networks

N Din, A Waheed, S Ullah, NU Amin… - International Journal of …, 2023 - Springer
The growth of media services, multimedia conferencing, interactive distance learning, and
distributed interactive simulations is becoming more dependent on the security of multicast …

An investigating study of blind and ID-based signcryption schemes for misuse risk protection and high performance computing

S Ullah, Z Jiangbin, MT Hussain, MW Sardar… - Cluster …, 2024 - Springer
The risks of misusing new and developing technology are increasing on a daily basis. In
these technologies, electronic communication (e-communication) anonymously delivers …

An efficient content source verification scheme for multi-receiver in NDN-based Internet of Things

S Hussain, SS Ullah, I Ali - Cluster Computing, 2022 - Springer
Abstract Internet of Things (IoT) is a heterogeneous environment where multiple
devices/consumers can interest/request for the same chunk of content at the same time with …

Efficient information-theoretically secure schemes for cloud data outsourcing

S Sobati-Moghadam - Cluster Computing, 2021 - Springer
Nowadays, outsourcing sensitive data to the cloud becomes popular. Outsourcing sensitive
data to the cloud raises confidentiality concerns due to the loss of data control by the data …