Search

Your search keyword '"Elliptic Curve Digital Signature Algorithm"' showing total 1,553 results

Search Constraints

Start Over You searched for: Descriptor "Elliptic Curve Digital Signature Algorithm" Remove constraint Descriptor: "Elliptic Curve Digital Signature Algorithm"
1,553 results on '"Elliptic Curve Digital Signature Algorithm"'

Search Results

1. Securing the edge: privacy-preserving federated learning for insider threats in IoT networks.

2. Interoperable IoRT for Healthcare: Securing Intelligent Systems with Decentralized Blockchain

3. Revolutionizing Indian Elections: Introducing Blockchain to Ballot Based Voting

4. Secure ECDSA SRAM-PUF Based on Universal Single/Double Scalar Multiplication Architecture.

5. Secure ECDSA SRAM-PUF Based on Universal Single/Double Scalar Multiplication Architecture

6. Exploring the Intersection of Lattice Attacks and Blockchain Technology: A Heuristic Approach Using TPM2.0 ECDSA to Ascertain and Approach the Boundary.

7. Attacking (EC)DSA with partially known multiples of nonces.

8. A unique secure multimodal biometrics-based user anonymous authenticated key management protocol (SMUAAKAP) based on block chain mechanism for generic HIoTNs.

9. An Efficient Security Mechanism for Cloud Data Using Elliptic Curve Digital Signature Algorithm with Wake–Sleep

10. Data Privacy Preservation and Trade-off Balance Between Privacy and Utility Using Deep Adaptive Clustering and Elliptic Curve Digital Signature Algorithm.

11. Formal verification for a PMQTT protocol

12. Exploring the Intersection of Lattice Attacks and Blockchain Technology: A Heuristic Approach Using TPM2.0 ECDSA to Ascertain and Approach the Boundary

13. Enhancing an Attack to DSA Schemes

14. Attacking (EC)DSA scheme with ephemeral keys sharing specific bits.

15. Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks

17. Refund Attacks on Bitcoin’s Payment Protocol

18. Formal verification for a PMQTT protocol.

19. A new enhancement of elliptic curve digital signature algorithm.

20. Big Data Security

23. Revisited—The Subliminal Channel in Blockchain and Its Application to IoT Security

24. On the Malleability of Bitcoin Transactions

25. Hierarchical Deterministic Bitcoin Wallets that Tolerate Key Leakage

26. Just a Little Bit More

27. New lattice attacks on DSA schemes

28. Storing information of stroke rehabilitation patients using blockchain technology

30. FPGA Implementation of Elliptic Curve Cryptoprocessor for Perceptual Layer of the Internet of Things

31. Lattice Attacks on DSA Schemes Based on Lagrange’s Algorithm

33. Data Privacy Preservation and Trade-off Balance Between Privacy and Utility Using Deep Adaptive Clustering and Elliptic Curve Digital Signature Algorithm

37. Template Attacks on ECDSA

38. Review and analysis of classical algorithms and hash-based post-quantum algorithm

39. Pseudo-randomness Inside Web Browsers

40. Elliptic Curve Digital Signature Algorithm Challenges and Development Stages

41. NOMOP-ECDSA: A Lightweight ECDSA Engine for Internet of Things

42. SCAB - IoTA: Secure communication and authentication for IoT applications using blockchain

43. RF-DNA: Radio-Frequency Certificates of Authenticity

44. Committing to quantum resistance: a slow defence for Bitcoin against a fast quantum computing attack

45. Analysing the MUTE Anonymous File-Sharing System Using the Pi-Calculus

46. On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan

47. Accelerated Verification of ECDSA Signatures

48. Enforcing Email Addresses Privacy Using Tokens

49. Reconfigurable Instruction Set Extension for Enabling ECC on an 8-Bit Processor

50. Instruction Set Extensions for Fast Arithmetic in Finite Fields GF(p) and GF(2 m )

Catalog

Books, media, physical & digital resources