Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey
Elliptic Curve (EC) is the most recent and advanced technique of Elliptic Curve
Cryptography (ECC). EC is often used to improve the security of open communication …
Cryptography (ECC). EC is often used to improve the security of open communication …
A perspective trend of hyperelliptic curve cryptosystem for lighted weighted environments
Abstract In modern cryptography, Light Weighted Environments (LWE) refer to low-
constrained environments (Pelzl et al., 2003) such as smartphones and other electronic …
constrained environments (Pelzl et al., 2003) such as smartphones and other electronic …
[HTML][HTML] Certificateless anti-quantum blind signcryption for e-cash
H Yu, Q Zhang, L Li - Journal of Industrial Information Integration, 2024 - Elsevier
Electronic cash (e-cash) has become major payment way in the era of internet of things.
However, the leakage of user privacy and transaction data is becoming more and more …
However, the leakage of user privacy and transaction data is becoming more and more …
A Comparative Study of Elliptic curve and Hyperelliptic Curve Cryptography Methods and an Overview of Their Applications
The significance of cybersecurity in today's highly technological era cannot be overstated.
With the advancement of modern technologies, various security measures have been …
With the advancement of modern technologies, various security measures have been …
[PDF][PDF] Text encryption using pell sequence and elliptic curves with provable security
The demand for data security schemes has increased with the significant advancement in
the field of computation and communication networks. We propose a novel three-step text …
the field of computation and communication networks. We propose a novel three-step text …
An Efficient Multidocument Blind Signcryption Scheme for Smart Grid‐Enabled Industrial Internet of Things
The smart grid‐enabled industrial Internet of Things (SG‐IIoT) is a hybrid data
communication network connected with the power grid that collects and analyzes data from …
communication network connected with the power grid that collects and analyzes data from …
A typology of secure multicast communication over 5 G/6 G networks
The growth of media services, multimedia conferencing, interactive distance learning, and
distributed interactive simulations is becoming more dependent on the security of multicast …
distributed interactive simulations is becoming more dependent on the security of multicast …
An investigating study of blind and ID-based signcryption schemes for misuse risk protection and high performance computing
S Ullah, Z Jiangbin, MT Hussain, MW Sardar… - Cluster …, 2024 - Springer
The risks of misusing new and developing technology are increasing on a daily basis. In
these technologies, electronic communication (e-communication) anonymously delivers …
these technologies, electronic communication (e-communication) anonymously delivers …
An efficient content source verification scheme for multi-receiver in NDN-based Internet of Things
Abstract Internet of Things (IoT) is a heterogeneous environment where multiple
devices/consumers can interest/request for the same chunk of content at the same time with …
devices/consumers can interest/request for the same chunk of content at the same time with …
Efficient information-theoretically secure schemes for cloud data outsourcing
S Sobati-Moghadam - Cluster Computing, 2021 - Springer
Nowadays, outsourcing sensitive data to the cloud becomes popular. Outsourcing sensitive
data to the cloud raises confidentiality concerns due to the loss of data control by the data …
data to the cloud raises confidentiality concerns due to the loss of data control by the data …