11   Artículos

 
en línea
Marcin Aftowicz, Ievgen Kabin, Zoya Dyka and Peter Langendörfer    
While IoT technology makes industries, cities, and homes smarter, it also opens the door to security risks. With the right equipment and physical access to the devices, the attacker can leverage side-channel information, like timing, power consumption, o... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Asher Sajid, Omar S. Sonbul, Muhammad Rashid and Muhammad Yousuf Irfan Zia    
The focus of this article is to present a novel crypto-accelerator architecture for a resource-constrained embedded system that utilizes elliptic curve cryptography (ECC). The architecture is built around Binary Edwards curves (BEC) to provide resistance... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Bikash Poudel, Arslan Munir, Joonho Kong and Muazzam A. Khan    
The elliptic curve cryptosystem (ECC) has been proven to be vulnerable to non-invasive side-channel analysis attacks, such as timing, power, visible light, electromagnetic emanation, and acoustic analysis attacks. In ECC, the scalar multiplication compon... ver más
Revista: Journal of Low Power Electronics and Applications    Formato: Electrónico

 
en línea
Mohamad Ali Mehrabi and Christophe Doche    
Twisted Edwards curves have been at the center of attention since their introduction by Bernstein et al. in 2007. The curve ED25519, used for Edwards-curve Digital Signature Algorithm (EdDSA), provides faster digital signatures than existing schemes with... ver más
Revista: Information    Formato: Electrónico

 
en línea
Jin Han Park, Yu Kyoung Park and Mi Jung Son    
In this paper, a hesitant probabilistic fuzzy multiple attribute group decision making is studied. First, some Einstein operations on hesitant probability fuzzy elements such as the Einstein sum, Einstein product, and Einstein scalar multiplication are p... ver más
Revista: Information    Formato: Electrónico

 
en línea
Yitao Chen, Weiwei Han     Pág. 629 - 636
Authenticated multiple key exchange (AMKE) protocols not only allow participants to warrant multiple session keys within one run of the protocol but also ensure the authenticity of the other party. Many AMKE protocols using bilinear pairings have been pr... ver más
Revista: Acta Scientiarum: Technology    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »