107 Hits in 3.9 sec

Table of Contents

2021 2021 International Telecommunications Conference (ITC-Egypt)  
Ibrahim, Fatma Newagy • Chaotic Isomorphic Elliptic Curve Cryptography for Secure Satellite Image Encryption Ahmed K. Ibrahim, Esam A. A. A. Hagras, Abdel Naser F. Mohamed, H. A.  ...  Mostafa Mostafa, ADC, Alexandria Based on Elliptic Curve Ahmed H. El-Sakka, Shawki Shaaban, Karim H.  ... 
doi:10.1109/itc-egypt52936.2021.9513977 fatcat:yq5ucwxvfzak7b2g5wom2plwpq


Norah Alassaf, Basem Alkazemi, Adnan Gutub
2017 Journal of research in engineering and applied sciences  
This work study several realistic lightweight encryption algorithms suitable for IoT medical systems.  ...  In order to protect the private medical data in the internet of things (IoT) field, the search for the optimal encryption algorithm is a must.  ...  Acknowledgments Thanks to Umm Al-Qura University (UQU) for encouraging this research work.  ... 
doi:10.46565/jreas.2017.v02i02.002 fatcat:5f734antefhq3bbezq3g7xr4jm

[Front matter]

2021 2021 International Telecommunications Conference (ITC-Egypt)  
Ibrahim, Fatma Newagy • Chaotic Isomorphic Elliptic Curve Cryptography for Secure Satellite Image Encryption Ahmed K. Ibrahim, Esam A. A. A. Hagras, Abdel Naser F. Mohamed, H. A.  ...  Nyangaresi, Zeyad Mohammad • Double Evolved Packet System Authentication and Key Agreement Protocol Based on Elliptic Curve Ahmed H. El-Sakka, Shawki Shaaban, Karim H.  ... 
doi:10.1109/itc-egypt52936.2021.9513952 fatcat:iylrtzfcjrgk7jeujtzaphkoxy

Making Password Authenticated Key Exchange Suitable for Resource-Constrained Industrial Control Devices [chapter]

Björn Haase, Benoît Labrique
2017 Lecture Notes in Computer Science  
We review the significant challenges faced for implementations on resource-constrained devices.  ...  Connectivity becomes increasingly important also for small embedded systems such as typically found in industrial control installations.  ...  We also would like to thank Tanja Lange for drawing our attention to the possibility of advantageous application of reptiles.  ... 
doi:10.1007/978-3-319-66787-4_17 fatcat:u3y7pcmgqzdudn4wt37fzupthy

Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks

Xiaojiang Du, Mohsen Guizani, Yang Xiao, Hsiao-Hwa Chen
2009 IEEE Transactions on Wireless Communications  
We utilize Elliptic Curve Cryptography in the design of an efficient key management scheme for sensor nodes.  ...  Index Terms-Security, key management, sensor networks, elliptic curve cryptography.  ...  A public key algorithm -Elliptic Curve Cryptography (ECC) is used to further improve the key management scheme.  ... 
doi:10.1109/twc.2009.060598 fatcat:scydk4afrfdslp3bmmbpuyg4o4

Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks [chapter]

Christian Lederer, Roland Mader, Manuel Koschuch, Johann Großschädl, Alexander Szekely, Stefan Tillich
2009 Lecture Notes in Computer Science  
In this paper we present a lightweight implementation of the elliptic curve Diffie-Hellman (ECDH) key exchange for ZigBee-compliant sensor nodes equipped with an ATmega128 processor running the TinyOS  ...  Despite some recent advances in this field, the efficient implementation of cryptographic key establishment for WSNs remains a challenge due to the resource constraints of small sensor nodes such as the  ...  The information in this document reflects only the authors' views, is provided as is, and no guarantee or warranty is given that the information is fit for any particular purpose.  ... 
doi:10.1007/978-3-642-03944-7_9 fatcat:a7fs5vel7zhafejmd57b4hn274

A Safe Traffic Network Design and Architecture, in the Context of IoT

Angeliki Kalapodi, Nicolas Sklavos, Ioannis D. Zaharakis, Achilles Kameas
2018 Zenodo  
Car accidents' rate gets higher over the years.A smart road network might offer very useful data for the construction of a real-time accident and traffic preventer.  ...  Cryptography could be the tool to the creation of a safe and useful IoT application.  ...  . ✓ Elliptic Curve Cryptography (ECC): a quite fresh approach to public key cryptography based on the algebraic structure of elliptic curves over finite fields.  ... 
doi:10.5281/zenodo.3374139 fatcat:qup6bi3rszadzmaaphr324w7ri

On security issues in embedded systems: challenges and solutions

Lyes Khelladi, Yacine Challal, Abdelmadjid Bouabdallah, Nadjib Badache
2008 International Journal of Information and Computer Security  
Elliptic Curve Cryptography (ECC): ECC [22] operates on a group of points on an elliptic curve defined over a finite field.  ...  Finally, we note that several cryptographic protocols have further been proposed using the elliptic curve cryptography such as Elliptic Curve Diffie Hellman (ECDH) key exchange, and Elliptic Curve Digital  ... 
doi:10.1504/ijics.2008.018515 fatcat:up7vrjklrneahhxxzibcspiae4

An Advanced Encryption Standard Powered Mutual Authentication Protocol Based on Elliptic Curve Cryptography for RFID, Proven on WISP

Alaauldin Ibrahim, Gökhan Dalkılıç
2017 Journal of Sensors  
In this paper, we propose a mutual authentication protocol for RFID tags based on elliptic curve cryptography and advanced encryption standard.  ...  Figure 2 : 2 (i) Domain parameters of prime field ( ) elliptic curve ( : 2 = 3 + + mod ) are : big prime number defined for finite field , a, b: defining the elliptic curve ( ),: generator point, : order  ...  In this paper, using the last revision of the Wireless Identification and Sensing Platform (WISP5) ( Figure 1 ) [8] , we propose a mutual authentication protocol based on elliptic curve cryptography  ... 
doi:10.1155/2017/2367312 fatcat:bfiqtgraj5ecre7dnwq7uhsqsi

Ontological Representation of Healthcare Application Security Using Blockchain Technology

Raimundas Matulevičius, Mubashar Iqbal, Emna Ammar Elhadjamor, Sonia Ayachi Ghannouchi, Mariia Bakhtina, Slaheddine Ghannouchi
2022 Informatica  
Blockchain is gaining traction for improving the security of healthcare applications, however, it does not become a silver bullet as various security threats are observed in blockchain-based applications  ...  For example, blockchain platforms are using an elliptic curve digital algorithm (ECDSA) that is not a quantum-resistant cryptography scheme, and it could be solved by quantum computers (Gao et al., 2018  ...  For example, Yin et al. (2018) implemented the anti-quantum transaction authentication scheme using lattice-based cryptography.  ... 
doi:10.15388/22-infor486 fatcat:sn4vbasabfgzfj25ybuqnqkx4a

Special issue on "Internet of Things: Research challenges and Solutions"

Eleonora Borgia, Danielo G. Gomes, Brent Lagesse, Rodger Lea, Daniele Puccinelli
2016 Computer Communications  
Acknowledgments We wish to thank all the authors for submitting their work to this special issue.  ...  We are extremely grateful to Marco Conti, Editor-in-Chief of the Elsevier Computer Communications, for giving us the possibility of serving the community with this special issue.  ...  Curve Cryptography to reduce the computational burden.  ... 
doi:10.1016/j.comcom.2016.04.024 fatcat:maaizonw7vafrljqumoystyugu

Atlas: A Service-Oriented Sensor Platform: Hardware and Middleware to Enable Programmable Pervasive Spaces

Jeffrey King, Raja Bose, Hen-i Yang, Steven Pickles, Abdelsalam Helal
2006 Local Computer Networks (LCN), Proceedings of the IEEE Conference on  
However, available sensor network platforms are inadequate for this task. The goals are requirements for a smart space are very different from the typical sensor network application.  ...  Our deployment of a smart house (an assistive environment for seniors) guided us to designing Atlas, a new, commercially available service-oriented sensor and actuator platform that enables self-integrative  ...  The low-level encryption features will, as other researches have recommend [27] , make use of elliptic curve cryptography due to the smaller keys necessary to provide equal protection as RSA.  ... 
doi:10.1109/lcn.2006.322026 dblp:conf/lcn/KingBYPH06 fatcat:u2an3shbnbhzfo6l6tnohthqjm

The Case for SIKE: A Decade of the Supersingular Isogeny Problem [article]

Craig Costello
2021 IACR Cryptology ePrint Archive  
In the final section I present the two SIKE challenges: $55k USD is up for grabs for the solutions of mini instances that, according to the SIKE team's security analysis, provide significantly less than  ...  I think there are exactly 3: SIKE (which scares me for being too new), Classic McEliece, and SPHINCS+." -Daniel J.  ...  Elegance "It is my intent to show that elliptic curves have a rich enough arithmetic structure so that they will provide a fertile ground for planting the seeds of cryptography." -Victor S.  ... 
dblp:journals/iacr/Costello21 fatcat:ydg626m5effxbjqahbpgexsxoa

Modelling Attacks in Blockchain Systems using Petri Nets [article]

Md. Atik Shahriar, Faisal Haque Bappy, A. K. M. Fakhrul Hossain, Dayamoy Datta Saikat, Md Sadek Ferdous, Mohammad Jabed M. Chowdhury, Md Zakirul Alam Bhuiyan
2020 arXiv   pre-print
Blockchain technology has evolved through many changes and modifications, such as smart-contracts since its inception in 2008.  ...  All elliptic curve cryptography algorithms are based on the assumption that the discrete logarithm problem on an elliptic curve is difficult to solve.  ...  Cryptographic algorithm vulnerabilities Most blockchain systems use Elliptic Curve Digital Signature Algorithm (ECDSA) for generating the public-private key pair that ensures the ownership of digital assets  ... 
arXiv:2011.07262v1 fatcat:4wrdlrvlbra7demfmi7owzvmcy

An Autonomous Log Storage Management Protocol with Blockchain Mechanism and Access Control for the Internet of Things

Chien-Lung Hsu, Wei-Xin Chen, Tuan-Vinh Le
2020 Sensors  
Providing good performance with elliptic curve small key size, short BLS signature, efficient signcryption method, and single sign-on solution, our work is suitable for the IoT.  ...  Moreover, these logs may be used as evidences for forensic investigations when cyber security incidents occur.  ...  Sowjanya and Dasgupta [34] presented another attribute-based encryption scheme for WBAN. The scheme achieves good performance with elliptic curve cryptography and attribute-based encryption.  ... 
doi:10.3390/s20226471 pmid:33198399 pmcid:PMC7697459 fatcat:sng7ui53vrcoln4vdgc4wef34e
« Previous Showing results 1 — 15 out of 107 results