|
|
|
Marcin Aftowicz, Ievgen Kabin, Zoya Dyka and Peter Langendörfer
While IoT technology makes industries, cities, and homes smarter, it also opens the door to security risks. With the right equipment and physical access to the devices, the attacker can leverage side-channel information, like timing, power consumption, o...
ver más
|
|
|
|
|
|
|
Asher Sajid, Omar S. Sonbul, Muhammad Rashid and Muhammad Yousuf Irfan Zia
The focus of this article is to present a novel crypto-accelerator architecture for a resource-constrained embedded system that utilizes elliptic curve cryptography (ECC). The architecture is built around Binary Edwards curves (BEC) to provide resistance...
ver más
|
|
|
|
|
|
|
Bikash Poudel, Arslan Munir, Joonho Kong and Muazzam A. Khan
The elliptic curve cryptosystem (ECC) has been proven to be vulnerable to non-invasive side-channel analysis attacks, such as timing, power, visible light, electromagnetic emanation, and acoustic analysis attacks. In ECC, the scalar multiplication compon...
ver más
|
|
|
|
|
|
|
Mohamad Ali Mehrabi and Christophe Doche
Twisted Edwards curves have been at the center of attention since their introduction by Bernstein et al. in 2007. The curve ED25519, used for Edwards-curve Digital Signature Algorithm (EdDSA), provides faster digital signatures than existing schemes with...
ver más
|
|
|
|
|
|
|
Jin Han Park, Yu Kyoung Park and Mi Jung Son
In this paper, a hesitant probabilistic fuzzy multiple attribute group decision making is studied. First, some Einstein operations on hesitant probability fuzzy elements such as the Einstein sum, Einstein product, and Einstein scalar multiplication are p...
ver más
|
|
|
|
|
|
|
Yitao Chen, Weiwei Han
Pág. 629 - 636
Authenticated multiple key exchange (AMKE) protocols not only allow participants to warrant multiple session keys within one run of the protocol but also ensure the authenticity of the other party. Many AMKE protocols using bilinear pairings have been pr...
ver más
|
|
|
|