Showing 21 - 40 results of 41 for search '"elliptic curve"', query time: 0.06s Refine Results
  1. 21

    Robust Distributed Reprogramming Protocol of Wireless Sensor Networks for Healthcare Systems by Kuo-Yu Tsai

    Published 2015-11-01
    “…In this paper, we propose a robust distributed reprogramming protocol of WSNs for healthcare systems, in which the security requirements are proved to be secure based on the elliptic curve discrete logarithm problem, such as existential unforgeability of signature for code image, authenticity of code image, freshness, and node compromised tolerance.…”
    Get full text
    Article
  2. 22

    Topological Indices of Total Graph and Zero Divisor Graph of Commutative Ring: A Polynomial Approach by Sourav Mondal, Muhammad Imran, Nilanjan De, Anita Pal

    Published 2023-01-01
    “…Graphs containing finite commutative rings have wide applications in robotics, information and communication theory, elliptic curve cryptography, physics, and statistics. …”
    Get full text
    Article
  3. 23

    Breaking the Blockchain Trilemma: A Comprehensive Consensus Mechanism for Ensuring Security, Scalability, and Decentralization by Khandakar Md Shafin, Saha Reno

    Published 2024-01-01
    “…Employing established techniques such as elliptic curve cryptography, Schnorr verifiable random function, and zero-knowledge proof (zk-SNARK), alongside groundbreaking methodologies for stake distribution, anomaly detection, and incentive alignment, our framework sets a new benchmark for secure, scalable, and decentralized blockchain ecosystems. …”
    Get full text
    Article
  4. 24

    A Novel Memcapacitor Model and Its Application for Image Encryption Algorithm by Nan Li, Junwei Sun, Yanfeng Wang

    Published 2019-01-01
    “…Furthermore, the elliptic curve with the hyperchaotic sequence is used to construct the Hill encryption matrix, and the plaintext image is permuted and encrypted. …”
    Get full text
    Article
  5. 25

    An Anonymous Authentication Scheme in VANETs of Smart City Based on Certificateless Group Signature by Yuanpan Zheng, Guangyu Chen, Liguan Guo

    Published 2020-01-01
    “…In this scheme, it can implement the process of adding, signing, verifying, and revoking group members only by simple multiplication of the elliptic curve and synchronization factor technology, which shortens the length of the signature and improves the efficiency of the signature. …”
    Get full text
    Article
  6. 26

    An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs by Jing Wang, Xue Yuan, Yingjie Xu, Yudi Zhang

    Published 2024-01-01
    “…To address these requirements, we propose a threshold elliptic curve digital signature algorithm that counters malicious adversaries in environments with three or more participants. …”
    Get full text
    Article
  7. 27

    Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols by Ang Yang, Junghyun Nam, Moonseong Kim, Kim-Kwang Raymond Choo

    Published 2014-01-01
    “…In this paper, we prove the security of the SM2 protocol in the widely accepted indistinguishability-based Bellare-Rogaway model under the elliptic curve discrete logarithm problem (ECDLP) assumption. …”
    Get full text
    Article
  8. 28

    Security and Market Liquidity Enhanced Transactive Energy System for Residential End Users by Vanga Anil, S. L. Arun

    Published 2025-01-01
    “…In order to address these issues, this study proposes an integrated approach combining elliptic curve digital signatures with hash functions for data integrity and authentication, Paillier cryptography for confidentiality, and calibrated noise for privacy preservation. …”
    Get full text
    Article
  9. 29

    EAP-Based Group Authentication and Key Agreement Protocol for Machine-Type Communications by Rong Jiang, Chengzhe Lai, Jun Luo, Xiaoping Wang, Hong Wang

    Published 2013-11-01
    “…In this paper, we propose a group authentication and key agreement protocol, called EG-AKA, for machine-type communications combining elliptic curve Diffie-Hellman (ECDH) based on EAP framework. …”
    Get full text
    Article
  10. 30

    Angle and Context Free Grammar Based Precarious Node Detection and Secure Data Transmission in MANETs by Anitha Veerasamy, Srinivasa Rao Madane, K. Sivakumar, Audithan Sivaraman

    Published 2016-01-01
    “…Another mechanism proposed in this paper, Angle and Context Free Grammar (ACFG) based precarious node elimination and secure communication in MANETs, intends to secure data transmission and detect precarious nodes in a MANET at a comparatively lower cost. The Elliptic Curve function is used to isolate a malicious node, thereby incorporating secure data transfer. …”
    Get full text
    Article
  11. 31

    Adaptable Security in Wireless Sensor Networks by Using Reconfigurable ECC Hardware Coprocessors by J. Portilla, A. Otero, E. de la Torre, T. Riesgo, O. Stecklina, S. Peter, P. Langendörfer

    Published 2010-10-01
    “…In order to avoid dependencies on a compromised level of security, a WSN node with a microcontroller and a Field Programmable Gate Array (FPGA) is used along this work to implement a state-of-the art solution based on ECC (Elliptic Curve Cryptography). In this paper it is described how the reconfiguration possibilities of the system can be used to adapt ECC parameters in order to increase or reduce the security level depending on the application scenario or the energy budget. …”
    Get full text
    Article
  12. 32

    Anonymous Authentication and Key Agreement Scheme Combining the Group Key for Vehicular Ad Hoc Networks by Mei Sun, Yuyan Guo, Dongbing Zhang, MingMing Jiang

    Published 2021-01-01
    “…In this study, an anonymous authentication and key negotiation scheme by using private key and group key is proposed, which is based on pseudonym using the nonsingular elliptic curve. In this scheme, there is no third party trust center to participate in the authentication, there is no need to query the database, and there is no need of the local database to save the identity information of many vehicles, which reduce the storage space and the authentication time compared with other schemes. …”
    Get full text
    Article
  13. 33

    Aggregation Scheme with Secure Hierarchical Clustering for Wireless Sensor Networks by Tung-Shih Su, Mei-Wen Huang, Wei-Shou Li, Wen-Shyong Hsieh

    Published 2012-07-01
    “…Due to our IP naming rules and type 1 nodes as cluster heads, public key cryptography, such as RSA (Rivest, Shamir, Adleman), or ECC (Elliptic Curve Cryptosystem), is easily implanted to our system to strengthen our security. …”
    Get full text
    Article
  14. 34

    Intelligent two-phase dual authentication framework for Internet of Medical Things by Muhammad Asif, Mohammad Abrar, Abdu Salam, Farhan Amin, Faizan Ullah, Sabir Shah, Hussain AlSalman

    Published 2025-01-01
    “…During the registration phase, our framework is based on Elliptic Curve Diffie-Hellman (ECDH) for rapid key exchange, and during real-time communication, our framework uses the Advanced Encryption Standard Galois Counter Mode (AES-GCM) to encrypt data securely. …”
    Get full text
    Article
  15. 35

    A Novel Spectrometer for Measuring Laser-Produced Plasma X-Ray in Inertial Confinement Fusion by Zhu Gang, Xiong Xian-cai, Zhong Xian-xin, Yang Yan

    Published 2012-01-01
    “…In order to diagnose laser-plasma distribution in space and evolution in time, an elliptical curved crystal spectrometer has been developed and applied to diagnose X-ray of laser-produced plasma in 0.2~2.46 nm region. …”
    Get full text
    Article
  16. 36

    The number of edges on generalizations of Paley graphs by Lawrence Sze

    Published 2001-01-01
    “…Here we obtain formulae for the number of edges of generalizations of these subgraphs using Gaussian hypergeometric series and elliptic curves. Such formulae are simple in several infinite families, including those studied by Evans, Pulham, and Sheenan.…”
    Get full text
    Article
  17. 37

    The vanishing of anticyclotomic $\mu $-invariants for non-ordinary modular forms by Hatley, Jeffrey, Lei, Antonio

    Published 2023-01-01
    “…This gives an alternative method to reprove a recent result of Matar on the vanishing of the $\mu $-invariants of plus and minus signed Selmer groups for elliptic curves.…”
    Get full text
    Article
  18. 38

    PATS: Let Parties Have a Say in Threshold Group Key Sharing by Adnan Kılıç, Cansu Betin Onur, Ertan Onur

    Published 2024-01-01
    “…In this paper, we present PATS, which employs finite fields and elliptic curves, along with its security and complexity analyses.…”
    Get full text
    Article
  19. 39

    Geometrically Nonlinear Analysis of Functionally Graded Timoshenko Curved Beams with Variable Curvatures by Ze-Qing Wan, Shi-Rong Li, Hong-Wei Ma

    Published 2019-01-01
    “…This paper presents some equilibrium paths and configurations of the elliptic curved beam for different pinching concentrated loads.…”
    Get full text
    Article
  20. 40

    Biaxial Shear Load Capacity of Anchor System for Quick-Hardening Track on Railway Bridges by Kyoung Chan Lee, Il-Wha Lee, Seong-Cheol Lee

    Published 2018-01-01
    “…The biaxial shear capacity of each design was investigated experimentally, and the structural capacity for biaxial shear loads was evaluated using an elliptical curve to represent the longitudinal and transverse shear capacities. …”
    Get full text
    Article