|
|
|
Mohamad Ali Mehrabi and Christophe Doche
Twisted Edwards curves have been at the center of attention since their introduction by Bernstein et al. in 2007. The curve ED25519, used for Edwards-curve Digital Signature Algorithm (EdDSA), provides faster digital signatures than existing schemes with...
ver más
|
|
|
|
|
|
|
Javier Omar Contreras Rodriguez, Reinaldo Nicolás Mayol Arnao
Pág. 41 - 53
En la actualidad, el auge de las aplicaciones de las redes de sensores inalámbricos (WSN = Wireless Sensors Networks) está generando una gran cantidad de información de carácter sensible que requiere un manejo confiable mediante la implementación de sist...
ver más
|
|
|
|
|
|
|
Nasour Bagheri, Ygal Bendavid, Masoumeh Safkhani and Samad Rostampour
A smart grid is an electricity network that uses advanced technologies to facilitate the exchange of information and electricity between utility companies and customers. Although most of the technologies involved in such grids have reached maturity, smar...
ver más
|
|
|
|
|
|
|
Muhammad Asghar Khan, Hosam Alhakami, Insaf Ullah, Wajdi Alhakami, Syed Agha Hassnain Mohsan, Usman Tariq and Nisreen Innab
Security and privacy issues were long a subject of concern with drones from the past few years. This is due to the lack of security and privacy considerations in the design of the drone, which includes unsecured wireless channels and insufficient computi...
ver más
|
|
|
|
|
|
|
Shuo Zhang, Yaping Liu, Zhiyu Han and Zhikai Yang
With the rapid development of unmanned aerial vehicles (UAVs), often referred to as drones, their security issues are attracting more and more attention. Due to open-access communication environments, UAVs may raise security concerns, including authentic...
ver más
|
|
|
|
|
|
|
Haotian Liang, Guidong Zhang, Wenjin Hou, Pinyi Huang, Bo Liu and Shouliang Li
Most of the image encryption schemes based on chaos have so far employed symmetric key cryptography, which leads to a situation where the key cannot be transmitted in public channels, thus limiting their extended application. Based on the elliptic curve ...
ver más
|
|
|
|
|
|
|
Hwajeong Seo
In this paper, we present scalable multi-precision multiplication implementation and scalable multi-precision squaring implementation for 32-bit ARM Cortex-M4 microcontrollers. For efficient computation and scalable functionality, we present optimized Mu...
ver más
|
|
|
|
|
|
|
Rajesh Natarajan, Gururaj Harinahallo Lokesh, Francesco Flammini, Anitha Premkumar, Vinoth Kumar Venkatesan and Shashi Kant Gupta
Background: The Internet of Medical Things, often known as IoMT, is a revolutionary method of connecting medical equipment and the software that operates on it to the computer networks that are used in healthcare 5.0. The rapid development of smart medic...
ver más
|
|
|
|
|
|
|
Ali Takieldeen, Said H. Abd Elkhalik, Ahmed S. Samra, Mohamed A. Mohamed and Fahmi Khalifa
With the progressive development of a wide range of applications, interconnect things and internet of things (IoT) became an imperative required trend by industries and academicians. IoT became a base infrastructure for remote access or control depending...
ver más
|
|
|
|
|
|
|
Régis Leveugle, Asma Mkhinini and Paolo Maistri
In the Internet of Things (IoT), many strong constraints have to be considered when designing the connected objects, including low cost and low power, thus limited resources. The confidentiality and integrity of sensitive data must however be ensured eve...
ver más
|
|
|
|
|
|
|
Rohit Kumar Das, Sanjeet Kumar Nayak, Sourav Kumar Bhoi, Suman Kumar Choudhury, Banshidhar Majhi and Sujata Mohanty
Due to an increase in the number of internet users, electronic commerce has grown significantly during the last decade. Electronic auction (e-auction) is one of the famous e-commerce applications. Even so, security and robustness of e-auction schemes sti...
ver más
|
|
|
|
|
|
|
Asher Sajid, Omar S. Sonbul, Muhammad Rashid and Muhammad Yousuf Irfan Zia
The focus of this article is to present a novel crypto-accelerator architecture for a resource-constrained embedded system that utilizes elliptic curve cryptography (ECC). The architecture is built around Binary Edwards curves (BEC) to provide resistance...
ver más
|
|
|
|