Search

Your search keyword '"Elliptic Curve Digital Signature Algorithm"' showing total 130 results

Search Constraints

Start Over You searched for: Descriptor "Elliptic Curve Digital Signature Algorithm" Remove constraint Descriptor: "Elliptic Curve Digital Signature Algorithm" Language english Remove constraint Language: english
130 results on '"Elliptic Curve Digital Signature Algorithm"'

Search Results

1. Interoperable IoRT for Healthcare: Securing Intelligent Systems with Decentralized Blockchain

2. Secure ECDSA SRAM-PUF Based on Universal Single/Double Scalar Multiplication Architecture.

3. Secure ECDSA SRAM-PUF Based on Universal Single/Double Scalar Multiplication Architecture

4. Exploring the Intersection of Lattice Attacks and Blockchain Technology: A Heuristic Approach Using TPM2.0 ECDSA to Ascertain and Approach the Boundary.

5. A unique secure multimodal biometrics-based user anonymous authenticated key management protocol (SMUAAKAP) based on block chain mechanism for generic HIoTNs.

6. Attacking (EC)DSA with partially known multiples of nonces.

7. Attacking (EC)DSA scheme with ephemeral keys sharing specific bits.

8. Exploring the Intersection of Lattice Attacks and Blockchain Technology: A Heuristic Approach Using TPM2.0 ECDSA to Ascertain and Approach the Boundary

9. Data Privacy Preservation and Trade-off Balance Between Privacy and Utility Using Deep Adaptive Clustering and Elliptic Curve Digital Signature Algorithm.

10. Formal verification for a PMQTT protocol

11. Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks

12. Formal verification for a PMQTT protocol.

13. A new enhancement of elliptic curve digital signature algorithm.

14. Revisited—The Subliminal Channel in Blockchain and Its Application to IoT Security

15. New lattice attacks on DSA schemes

16. FPGA Implementation of Elliptic Curve Cryptoprocessor for Perceptual Layer of the Internet of Things

17. Committing to quantum resistance: a slow defence for Bitcoin against a fast quantum computing attack

18. Secure embedded OS image signing

19. An Efficient Double Parameter Elliptic Curve Digital Signature Algorithm for Blockchain

20. Efficient Integrity Verification Scheme for Medical Data Records in Cloud-Assisted Wireless Medical Sensor Networks.

21. SECURE HYBRID ENCRYPTION USING ECC IN CLOUDS.

22. INFORMATION TECHNOLOGY OF THE IDENTIFICATION SUBSYSTEM BASED ON ELECTRONIC KEYS IN ELECTRONIC DOCUMENT MANAGEMENT SYSTEMS

23. A robust computational DRM framework for protecting multimedia contents using AES and ECC

24. Horizontal SCA Attacks against kP Algorithm Using K-Means and PCA

25. A Fault-Based Secret Key Retrieval Method for ECDSA: Analysis and Countermeasure.

26. HORSIC+: An Efficient Post-Quantum Few-Time Signature Scheme

27. Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks

28. Revisited—The Subliminal Channel in Blockchain and Its Application to IoT Security

29. Refresh When You Wake Up: Proactive Threshold Wallets with Offline Devices

30. Black-Box IoT: Authentication and Distributed Storage of IoT Data from Constrained Sensors

31. Speeding-Up Verification of Digital Signatures

32. Crypto‐based algorithms for secured medical image transmission.

33. A Novel Elliptic Curve Cryptography Based Approach of Re-watermarking for Cheque Truncation System.

34. A simple and rapid authentication protocol in mobile networks.

35. Super Digit-Serial Systolic Multiplier over GF(2^m).

36. An ECDSA signature scheme designs for PBOC 2.0 specifications.

37. A Tale of Three Signatures: practical attack of ECDSA with wNAF

38. Threshold ECDSA with an Offline Recovery Party

39. REISCH: Incorporating Lightweight and Reliable Algorithms into Healthcare Applications of WSNs

40. When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA

41. An ECDSA Approach to Access Control in Knowledge Management Systems Using Blockchain

42. Experimental test of ECDSA digital signature robustness from timing-lattice attack

43. IoT-CryptoDiet : Implementing a lightweight cryptographic library based on ecdh and ecdsa for the development of secure and rivacy-preserving protocols in contiki-ng

44. An experimental analysis of ECQV implicit certificates performance in VANETs

45. Elliptic Curve Digital Signature Algorithm for the Third Party Auditing

46. Enhanced Instant Message Security and Privacy Protection Scheme for Mobile Social Network Systems

47. Performance Costs of Software Cryptography in Securing New-Generation Internet of Energy Endpoint Devices

48. A blind digital signature scheme using elliptic curve digital signature algorithm.

49. Performance comparison between IBE-HWMP and ECDSA-HWMP.

50. An identity-based authentication scheme for safety messages in WAVE-enabled VANETs.

Catalog

Books, media, physical & digital resources