A Systematic Review of Fast, Scalable, and Efficient Hardware Implementations of Elliptic Curve Cryptography for Blockchain
Blockchain technology entered the enterprise domain under the name of permissioned
blockchains and hybrid or verifiable database systems, as they provide a distributed solution …
blockchains and hybrid or verifiable database systems, as they provide a distributed solution …
DCryp-Unit: Crypto Hardware Accelerator Unit Design for Elliptic Curve Point Multiplication
We propose a hardware-optimized design that implements a Montgomery Elliptic-curve
point multiplication Algorithm over using Lopez-Dahab projective coordinates. Moreover, we …
point multiplication Algorithm over using Lopez-Dahab projective coordinates. Moreover, we …
Speeding-Up Elliptic Curve Cryptography Algorithms
D Maimuţ, AC Matei - Mathematics, 2022 - mdpi.com
In recent decades there has been an increasing interest in Elliptic curve cryptography (ECC)
and, especially, the Elliptic Curve Digital Signature Algorithm (ECDSA) in practice. The …
and, especially, the Elliptic Curve Digital Signature Algorithm (ECDSA) in practice. The …
[HTML][HTML] CrowdRouting: trustworthy and customized cross-domain routing based on crowdsourcing
J Zhang, Z Yan, H Dong, P Zhang - Digital Communications and Networks, 2024 - Elsevier
Cross-domain routing in Integrated Heterogeneous Networks (Inte-HetNet) should ensure
efficient and secure data transmission across different network domains by satisfying diverse …
efficient and secure data transmission across different network domains by satisfying diverse …
Blockchain integrated DFL model for IIoT data security in smart cities
In the rapidly evolving landscape of the Industrial Internet of Things (IIoT) within smart cities,
ensuring data security, confidentiality, and privacy remains a significant challenge …
ensuring data security, confidentiality, and privacy remains a significant challenge …
Baldur: A Hybrid Blockchain Database with FPGA or GPU Acceleration
In the last decade, blockchain technologies have entered the enterprise space in the form of
permissioned blockchains, verifiable databases, and hybrid blockchain database systems …
permissioned blockchains, verifiable databases, and hybrid blockchain database systems …
Method for Verifying Blockchain Transaction Amounts Based on Digital Signatures
In response to the potential issue of transaction amount leakage in current blockchain
systems, we have explored an efficient, low computational complexity method for the secure …
systems, we have explored an efficient, low computational complexity method for the secure …
Hardware accelerators for post-quantum cryptography and fully homomorphic encryption
R Agrawal - 2023 - search.proquest.com
With the monetization of user data, data breaches have become very common these days. In
the past five years, there were more than 7000 data breaches involving theft of personal …
the past five years, there were more than 7000 data breaches involving theft of personal …
Versatile Hardware Framework for Elliptic Curve Cryptography
V Mašek, M Novotný - … on Design and Diagnostics of Electronic …, 2022 - ieeexplore.ieee.org
We propose versatile hardware framework for ECC. The framework supports arithmetic
operations over P-256, Ed25519 and Curve25519 curves, enabling easy implementation of …
operations over P-256, Ed25519 and Curve25519 curves, enabling easy implementation of …