A review of techniques for implementing elliptic curve point multiplication on hardware
A Verri Lucca, GA Mariano Sborz… - Journal of Sensor and …, 2020 - mdpi.com
Cryptography is considered indispensable among security measures applied to data
concerning insecure means of transmission. Among various existent algorithms on …
concerning insecure means of transmission. Among various existent algorithms on …
A systematic literature review and meta-analysis on scalable blockchain-based electronic voting systems
Electronic voting systems must find solutions to various issues with authentication, data
privacy and integrity, transparency, and verifiability. On the other hand, Blockchain …
privacy and integrity, transparency, and verifiability. On the other hand, Blockchain …
A secure lightweight fuzzy embedder based user authentication scheme for internet of medical things applications
Abstract The Internet of Medical Things (IoMT) is a network of medical devices, hardware
infrastructure, and software that allows healthcare information technology to be …
infrastructure, and software that allows healthcare information technology to be …
High throughput and low area architectures of secure IoT algorithm for medical image encryption
Z Mishra, B Acharya - Journal of Information Security and Applications, 2020 - Elsevier
The favor that lightweight encryption algorithms have gained over the recent years regarding
data and image security in a resource constrained environment of the smart device sort in …
data and image security in a resource constrained environment of the smart device sort in …
Flexible architectures for cryptographic algorithms—A systematic literature review
Symmetric and asymmetric cryptographic algorithms are used for a secure transmission of
data over an unsecured public channel. In order to use these algorithms in real-time …
data over an unsecured public channel. In order to use these algorithms in real-time …
A Systematic Review of Fast, Scalable, and Efficient Hardware Implementations of Elliptic Curve Cryptography for Blockchain
Blockchain technology entered the enterprise domain under the name of permissioned
blockchains and hybrid or verifiable database systems, as they provide a distributed solution …
blockchains and hybrid or verifiable database systems, as they provide a distributed solution …
A hybrid approach for efficient and secure point multiplication on binary edwards curves
The focus of this article is to present a novel crypto-accelerator architecture for a resource-
constrained embedded system that utilizes elliptic curve cryptography (ECC). The …
constrained embedded system that utilizes elliptic curve cryptography (ECC). The …
Innovative dual-binary-field architecture for point multiplication of elliptic curve cryptography
J Li, W Wang, J Zhang, Y Luo, S Ren - IEEE Access, 2021 - ieeexplore.ieee.org
High-performance Elliptic Curve Cryptography (ECC) implementation in encryption
authentication severs has become a challenge due to the explosive growth of e-commerce's …
authentication severs has become a challenge due to the explosive growth of e-commerce's …
High-Performance ECC Scalar Multiplication Architecture Based on Comb Method and Low-Latency Window Recoding Algorithm
Elliptic curve scalar multiplication (ECSM) is the essential operation in elliptic curve
cryptography (ECC) for achieving high performance and security. We introduce a novel high …
cryptography (ECC) for achieving high performance and security. We introduce a novel high …
Survey: Vulnerability analysis of low-cost ECC-based RFID protocols against wireless and side-channel attacks
The radio frequency identification (RFID) system is one of the most important technologies of
the Internet of Things (IoT) that tracks single or multiple objects. This technology is …
the Internet of Things (IoT) that tracks single or multiple objects. This technology is …