Search

Your search keyword '"Elliptic Curve Digital Signature Algorithm"' showing total 131 results

Search Constraints

Start Over You searched for: Descriptor "Elliptic Curve Digital Signature Algorithm" Remove constraint Descriptor: "Elliptic Curve Digital Signature Algorithm" Language english Remove constraint Language: english
131 results on '"Elliptic Curve Digital Signature Algorithm"'

Search Results

1. Securing the edge: privacy-preserving federated learning for insider threats in IoT networks.

2. Interoperable IoRT for Healthcare: Securing Intelligent Systems with Decentralized Blockchain

3. Secure ECDSA SRAM-PUF Based on Universal Single/Double Scalar Multiplication Architecture.

4. Secure ECDSA SRAM-PUF Based on Universal Single/Double Scalar Multiplication Architecture

5. Exploring the Intersection of Lattice Attacks and Blockchain Technology: A Heuristic Approach Using TPM2.0 ECDSA to Ascertain and Approach the Boundary.

6. Attacking (EC)DSA with partially known multiples of nonces.

7. A unique secure multimodal biometrics-based user anonymous authenticated key management protocol (SMUAAKAP) based on block chain mechanism for generic HIoTNs.

8. Data Privacy Preservation and Trade-off Balance Between Privacy and Utility Using Deep Adaptive Clustering and Elliptic Curve Digital Signature Algorithm.

9. Formal verification for a PMQTT protocol

10. Attacking (EC)DSA scheme with ephemeral keys sharing specific bits.

11. Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks

12. Formal verification for a PMQTT protocol.

13. A new enhancement of elliptic curve digital signature algorithm.

14. New lattice attacks on DSA schemes

15. FPGA Implementation of Elliptic Curve Cryptoprocessor for Perceptual Layer of the Internet of Things

16. Committing to quantum resistance: a slow defence for Bitcoin against a fast quantum computing attack

17. Secure embedded OS image signing

18. Efficient Integrity Verification Scheme for Medical Data Records in Cloud-Assisted Wireless Medical Sensor Networks.

19. SECURE HYBRID ENCRYPTION USING ECC IN CLOUDS.

20. An Efficient Double Parameter Elliptic Curve Digital Signature Algorithm for Blockchain

21. INFORMATION TECHNOLOGY OF THE IDENTIFICATION SUBSYSTEM BASED ON ELECTRONIC KEYS IN ELECTRONIC DOCUMENT MANAGEMENT SYSTEMS

22. A robust computational DRM framework for protecting multimedia contents using AES and ECC

23. Horizontal SCA Attacks against kP Algorithm Using K-Means and PCA

24. A Fault-Based Secret Key Retrieval Method for ECDSA: Analysis and Countermeasure.

25. HORSIC+: An Efficient Post-Quantum Few-Time Signature Scheme

26. Revisited—The Subliminal Channel in Blockchain and Its Application to IoT Security

27. Refresh When You Wake Up: Proactive Threshold Wallets with Offline Devices

28. Crypto‐based algorithms for secured medical image transmission.

29. A Novel Elliptic Curve Cryptography Based Approach of Re-watermarking for Cheque Truncation System.

30. Black-Box IoT: Authentication and Distributed Storage of IoT Data from Constrained Sensors

31. Speeding-Up Verification of Digital Signatures

32. Super Digit-Serial Systolic Multiplier over GF(2^m).

33. An ECDSA signature scheme designs for PBOC 2.0 specifications.

34. A simple and rapid authentication protocol in mobile networks.

35. A Tale of Three Signatures: practical attack of ECDSA with wNAF

36. Threshold ECDSA with an Offline Recovery Party

37. Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks

38. REISCH: Incorporating Lightweight and Reliable Algorithms into Healthcare Applications of WSNs

39. When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA

40. An ECDSA Approach to Access Control in Knowledge Management Systems Using Blockchain

41. A blind digital signature scheme using elliptic curve digital signature algorithm.

42. Performance comparison between IBE-HWMP and ECDSA-HWMP.

43. An identity-based authentication scheme for safety messages in WAVE-enabled VANETs.

44. Enhanced Instant Message Security and Privacy Protection Scheme for Mobile Social Network Systems

45. Performance Costs of Software Cryptography in Securing New-Generation Internet of Energy Endpoint Devices

46. Experimental test of ECDSA digital signature robustness from timing-lattice attack

47. IoT-CryptoDiet : Implementing a lightweight cryptographic library based on ecdh and ecdsa for the development of secure and rivacy-preserving protocols in contiki-ng

48. An experimental analysis of ECQV implicit certificates performance in VANETs

49. Elliptic Curve Digital Signature Algorithm for the Third Party Auditing

50. Efficient Fixed Base Exponentiation and Scalar Multiplication based on a Multiplicative Splitting Exponent Recoding

Catalog

Books, media, physical & digital resources