You are currently viewing a new version of our website. To view the old version click .

142 Results Found

  • Article
  • Open Access
44 Citations
5,826 Views
19 Pages

Design and Implementation of High-Performance ECC Processor with Unified Point Addition on Twisted Edwards Curve

  • Md. Mainul Islam,
  • Md. Selim Hossain,
  • Moh. Khalid Hasan,
  • Md. Shahjalal and
  • Yeong Min Jang

10 September 2020

With the swift evolution of wireless technologies, the demand for the Internet of Things (IoT) security is rising immensely. Elliptic curve cryptography (ECC) provides an attractive solution to fulfill this demand. In recent years, Edwards curves hav...

  • Article
  • Open Access
14 Citations
8,425 Views
22 Pages

Design of an Elliptic Curve Cryptography Processor for RFID Tag Chips

  • Zilong Liu,
  • Dongsheng Liu,
  • Xuecheng Zou,
  • Hui Lin and
  • Jian Cheng

26 September 2014

Radio Frequency Identification (RFID) is an important technique for wireless sensor networks and the Internet of Things. Recently, considerable research has been performed in the combination of public key cryptography and RFID. In this paper, an effi...

  • Article
  • Open Access
12 Citations
2,808 Views
24 Pages

18 April 2022

Elliptic curve cryptography (ECC) is one of the commonly used standard methods for encrypting and signing messages which is especially applicable to resource-constrained devices such as sensor nodes that are networked in the Internet of Things. The s...

  • Article
  • Open Access
46 Citations
4,938 Views
20 Pages

High-Speed and Unified ECC Processor for Generic Weierstrass Curves over GF(p) on FPGA

  • Asep Muhamad Awaludin,
  • Harashta Tatimma Larasati and
  • Howon Kim

19 February 2021

In this paper, we present a high-speed, unified elliptic curve cryptography (ECC) processor for arbitrary Weierstrass curves over GF(p), which to the best of our knowledge, outperforms other similar works in terms of execution time. Our approach empl...

  • Article
  • Open Access
2 Citations
1,556 Views
27 Pages

Area-Time-Efficient Secure Comb Scalar Multiplication Architecture Based on Recoding

  • Zhantao Zhang,
  • Weijiang Wang,
  • Jingqi Zhang,
  • Xiang He,
  • Mingzhi Ma,
  • Shiwei Ren and
  • Hua Dang

7 October 2024

With the development of mobile communication, digital signatures with low latency, low area, and high security are in increasing demand. Elliptic curve cryptography (ECC) is widely used because of its security and lightweight. Elliptic curve scalar m...

  • Article
  • Open Access
13 Citations
5,897 Views
15 Pages

In wireless sensor networks (WSNs), users can use broadcast authentication mechanisms to connect to the target network and disseminate their messages within the network. Since data transfer for sensor networks is wireless, as a result, attackers can...

  • Article
  • Open Access
39 Citations
7,279 Views
21 Pages

11 April 2014

Data aggregation is an important technique for reducing the energy consumption of sensor nodes in wireless sensor networks (WSNs). However, compromised aggregators may forge false values as the aggregated results of their child nodes in order to cond...

  • Article
  • Open Access
45 Citations
18,545 Views
20 Pages

Hybrid AES-ECC Model for the Security of Data over Cloud Storage

  • Saba Rehman,
  • Nida Talat Bajwa,
  • Munam Ali Shah,
  • Ahmad O. Aseeri and
  • Adeel Anjum

31 October 2021

A cloud computing environment provides a cost-effective way for the end user to store and access private data over remote storage using some Internet connection. The user has access to the data anywhere and at any time. However, the data over the clo...

  • Article
  • Open Access
40 Citations
6,152 Views
19 Pages

A Multi-Server Two-Factor Authentication Scheme with Un-Traceability Using Elliptic Curve Cryptography

  • Guosheng Xu,
  • Shuming Qiu,
  • Haseeb Ahmad,
  • Guoai Xu,
  • Yanhui Guo,
  • Miao Zhang and
  • Hong Xu

23 July 2018

To provide secure communication, the authentication-and-key-agreement scheme plays a vital role in multi-server environments, Internet of Things (IoT), wireless sensor networks (WSNs), etc. This scheme enables users and servers to negotiate for a com...

  • Article
  • Open Access
6 Citations
6,813 Views
19 Pages

A Robust and Effective Two-Factor Authentication (2FA) Protocol Based on ECC for Mobile Computing

  • Kaijun Liu,
  • Zhou Zhou,
  • Qiang Cao,
  • Guosheng Xu,
  • Chenyu Wang,
  • Yuan Gao,
  • Weikai Zeng and
  • Guoai Xu

30 March 2023

The rapid development of mobile computing (e.g., mobile health, mobile payments, and smart homes) has brought great convenience to our lives. It is well-known that the security and privacy of user information from these applications and services is c...

  • Article
  • Open Access
37 Citations
3,368 Views
17 Pages

An Efficient and Privacy-Preserving Scheme for Disease Prediction in Modern Healthcare Systems

  • Shynu Padinjappurathu Gopalan,
  • Chiranji Lal Chowdhary,
  • Celestine Iwendi,
  • Muhammad Awais Farid and
  • Lakshmana Kumar Ramasamy

26 July 2022

With the Internet of Things (IoT), mobile healthcare applications can now offer a variety of dimensionalities and online services. Disease Prediction Systems (DPS) increase the speed and accuracy of diagnosis, improving the quality of healthcare serv...

  • Article
  • Open Access
117 Views
29 Pages

29 December 2025

The rapid convergence of artificial intelligence (AI), cloud computing, and 5G communication has positioned extended reality (XR) as a core technology bridging the physical and virtual worlds. Encompassing virtual reality (VR), augmented reality (AR)...

  • Article
  • Open Access
4 Citations
4,985 Views
21 Pages

30 May 2024

The rapid advancement of technology, alongside state-of-the-art techniques is at an all-time high. However, this unprecedented growth of technological prowess also brings forth potential threats, as oftentimes the security encompassing these technolo...

  • Article
  • Open Access
19 Citations
4,064 Views
16 Pages

3 April 2019

The current advances in cloud-based services have significantly enhanced individual satisfaction in numerous modern life areas. Particularly, the recent spectacular innovations in the wireless body area networks (WBAN) domain have made e-Care service...

  • Article
  • Open Access
41 Citations
4,144 Views
20 Pages

A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks

  • Mahmood A. Al-Shareeda,
  • Mohammed Anbar,
  • Selvakumar Manickam and
  • Iznan H. Hasbullah

22 February 2022

Existing identity-based schemes utilized in Vehicular Ad hoc Networks (VANETs) rely on roadside units to offer conditional privacy-preservation authentication and are vulnerable to insider attacks. Achieving rapid message signing and verification for...

  • Article
  • Open Access
8 Citations
4,504 Views
11 Pages

A New ECDLP-Based PoW Model

  • Alessio Meneghetti,
  • Massimiliano Sala and
  • Daniele Taufer

12 August 2020

Blockchain technology has attracted a lot of research interest in the last few years. Originally, their consensus algorithm was Hashcash, which is an instance of the so-called Proof-of-Work. Nowadays, there are several competing consensus algorithms,...

  • Article
  • Open Access
17 Citations
3,408 Views
17 Pages

1 September 2022

In the present era, the consensus for blockchain is of three types: consortium/permissioned, decentralized/permissionless, and somewhat decentralized. Presently, security and privacy of blockchain scenarios are in four directions: auditability and tr...

  • Article
  • Open Access
34 Citations
6,873 Views
20 Pages

Security in Wireless Sensor Networks: A Cryptography Performance Analysis at MAC Layer

  • Mauro Tropea,
  • Mattia Giovanni Spina,
  • Floriano De Rango and
  • Antonio Francesco Gentile

Wireless Sensor Networks (WSNs) are networks of small devices with limited resources which are able to collect different information for a variety of purposes. Energy and security play a key role in these networks and MAC aspects are fundamental in t...

  • Article
  • Open Access
30 Citations
7,915 Views
16 Pages

14 September 2019

Twisted Edwards curves have been at the center of attention since their introduction by Bernstein et al. in 2007. The curve ED25519, used for Edwards-curve Digital Signature Algorithm (EdDSA), provides faster digital signatures than existing schemes...

  • Article
  • Open Access
33 Citations
4,994 Views
27 Pages

29 January 2021

Optimization of resource consumption and decreasing the response time of authentication requests is an immense urgent requirement for supporting the scalability of resources in IoT environments. The existing research attempts to design lightweight au...

  • Article
  • Open Access
3 Citations
2,831 Views
26 Pages

(1) Background: With an advanced technique, third-generation sequencing (TGS) provides services with long deoxyribonucleic acid (DNA) reads and super short sequencing time. It enables onsite mobile DNA sequencing solutions for enabling ubiquitous hea...

  • Article
  • Open Access
4 Citations
1,937 Views
20 Pages

The drone-assisted Internet of Vehicles (DIoV) displays great potential in the punctual provision of rescue services without geographical limitations. To ensure data security in accident response and rescue services, authentication schemes with acces...

  • Article
  • Open Access
6 Citations
8,094 Views
16 Pages

Modular reduction of large values is a core operation in most common public-key cryptosystems that involves intensive computations in finite fields. Within such schemes, efficiency is a critical issue for the effectiveness of practical implementation...

  • Article
  • Open Access
16 Citations
3,952 Views
15 Pages

12 May 2023

The Internet of Things requires greater attention to the security and privacy of the network. Compared to other public-key cryptosystems, elliptic curve cryptography can provide better security and lower latency with shorter keys, rendering it more s...

  • Article
  • Open Access
9 Citations
2,775 Views
17 Pages

23 June 2021

Internet of Things (IoT) is composed of various kinds of devices such as cars, electrical appliances, machines and sensors. With IoT technologies, devices can exchange information through the network, people are allowed to get information collected b...

  • Article
  • Open Access
3 Citations
2,793 Views
22 Pages

The increasing interconnectivity of devices on the Internet of Things (IoT) introduces significant security challenges, particularly around authentication and data management. Traditional centralized approaches are not sufficient to address these ris...

  • Article
  • Open Access
125 Citations
8,739 Views
18 Pages

23 June 2017

In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless se...

  • Article
  • Open Access
21 Citations
6,712 Views
19 Pages

14 July 2015

The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables commun...

  • Article
  • Open Access
34 Citations
3,562 Views
24 Pages

Lightweight Architecture for Elliptic Curve Scalar Multiplication over Prime Field

  • Yue Hao,
  • Shun’an Zhong,
  • Mingzhi Ma,
  • Rongkun Jiang,
  • Shihan Huang,
  • Jingqi Zhang and
  • Weijiang Wang

In this paper, we present a novel lightweight elliptic curve scalar multiplication architecture for random Weierstrass curves over prime field Fp. The elliptic curve scalar multiplication is executed in Jacobian coordinates based on the Montgomery la...

  • Article
  • Open Access
12 Citations
2,847 Views
25 Pages

A Lightweight, Efficient, and Physically Secure Key Agreement Authentication Protocol for Vehicular Networks

  • Shaoqiang Wang,
  • Ziyao Fan,
  • Yu Su,
  • Baosen Zheng,
  • Zhaoyuan Liu and
  • Yinfei Dai

In the contemporary era, Vehicular Ad Hoc Networks (VANETs) have emerged as a vital technology in intelligent transportation systems, substantially enhancing the overall travel experience by providing advanced services to vehicles while ensuring driv...

  • Article
  • Open Access
1 Citations
1,993 Views
17 Pages

30 July 2024

As a hot technology trend, the federated learning (FL) cleverly combines data utilization and privacy protection by processing data locally on the client and only sharing model parameters with the server, embodying an efficient and secure collaborati...

  • Review
  • Open Access
2 Citations
6,367 Views
21 Pages

Elliptic Curve Cryptography with Machine Learning

  • Jihane Jebrane,
  • Akram Chhaybi,
  • Saiida Lazaar and
  • Abderrahmane Nitaj

Elliptic Curve Cryptography (ECC) is a technology based on the arithmetic of elliptic curves used to build strong and efficient cryptosystems and infrastructures. Several ECC systems, such as the Diffie–Hellman key exchange and the Elliptic Cur...

  • Feature Paper
  • Review
  • Open Access
45 Citations
7,796 Views
17 Pages

A Review of Techniques for Implementing Elliptic Curve Point Multiplication on Hardware

  • Arielle Verri Lucca,
  • Guilherme Augusto Mariano Sborz,
  • Valderi Reis Quietinho Leithardt,
  • Marko Beko,
  • Cesar Albenes Zeferino and
  • Wemerson Delcio Parreira

Cryptography is considered indispensable among security measures applied to data concerning insecure means of transmission. Among various existent algorithms on asymmetric cryptography, we may cite Elliptic Curve Cryptography (ECC), which has been wi...

  • Article
  • Open Access
16 Citations
5,695 Views
14 Pages

Low-Cost Area-Efficient FPGA-Based Multi-Functional ECDSA/EdDSA

  • Binh Kieu-Do-Nguyen,
  • Cuong Pham-Quoc,
  • Ngoc-Thinh Tran,
  • Cong-Kha Pham and
  • Trong-Thuc Hoang

In cryptography, elliptic curve cryptography (ECC) is considered an efficient and secure method to implement digital signature algorithms (DSAs). ECC plays an essential role in many security applications, such as transport layer security (TLS), inter...

  • Article
  • Open Access
9 Citations
4,803 Views
16 Pages

17 March 2024

Elliptic curve cryptography (ECC) is widely acknowledged as a method for implementing public key cryptography on devices with limited resources thanks to its use of small keys. A crucial and complex operation in ECC calculations is scalar point multi...

  • Feature Paper
  • Article
  • Open Access
51 Citations
9,817 Views
20 Pages

Secure Elliptic Curve Crypto-Processor for Real-Time IoT Applications

  • Stefano Di Matteo,
  • Luca Baldanzi,
  • Luca Crocetti,
  • Pietro Nannipieri,
  • Luca Fanucci and
  • Sergio Saponara

1 August 2021

Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low latencies are required, along with security requirements to protect the large number of attack surfaces to which IoT devices are exposed. Elliptic Curve C...

  • Article
  • Open Access
7 Citations
4,571 Views
20 Pages

iTrust—A Trustworthy and Efficient Mapping Scheme in Elliptic Curve Cryptography

  • Hisham Almajed,
  • Ahmad Almogren and
  • Mohammed Alabdulkareem

30 November 2020

Recently, many platforms have outsourced tasks to numerous smartphone devices known as Mobile Crowd-sourcing System (MCS). The data is collected and transferred to the platform for further analysis and processing. These data needs to maintain confide...

  • Article
  • Open Access
32 Citations
6,826 Views
31 Pages

29 October 2020

Recent growth in the Internet of Things (IoT) has raised security concerns over the confidentiality of data exchanged between IoT devices and the edge. Many IoT systems adopt asymmetric cryptography to secure their data and communications. A drawback...

  • Article
  • Open Access
7 Citations
2,311 Views
29 Pages

11 February 2024

The Internet of Things (IoT) is a technological paradigm that has gained significant momentum the last decade and, among other features, enables the development of intelligent and interoperable device networks. In this respect, it has triggered the c...

  • Article
  • Open Access
7 Citations
4,452 Views
13 Pages

Speeding-Up Elliptic Curve Cryptography Algorithms

  • Diana Maimuţ and
  • Alexandru Cristian Matei

7 October 2022

In recent decades there has been an increasing interest in Elliptic curve cryptography (ECC) and, especially, the Elliptic Curve Digital Signature Algorithm (ECDSA) in practice. The rather recent developments of emergent technologies, such as blockch...

  • Article
  • Open Access
15 Citations
6,983 Views
25 Pages

29 July 2013

Typically, commercial sensor nodes are equipped with MCUsclocked at a low-frequency (i.e., within the 4–12 MHz range). Consequently, executing cryptographic algorithms in those MCUs generally requires a huge amount of time. In this respect, the requi...

  • Proceeding Paper
  • Open Access
9 Citations
4,477 Views
10 Pages

18 December 2023

Elliptic-curve cryptography (ECC) has become a robust cryptographic technique that ensures secure data transmission with comparatively small key sizes. In this context, this research introduces a novel approach to ECC-key-pair generation by utilizing...

  • Article
  • Open Access
129 Citations
11,801 Views
19 Pages

Analytical Study of Hybrid Techniques for Image Encryption and Decryption

  • Chiranji Lal Chowdhary,
  • Pushpam Virenbhai Patel,
  • Krupal Jaysukhbhai Kathrotia,
  • Muhammad Attique,
  • Kumaresan Perumal and
  • Muhammad Fazal Ijaz

10 September 2020

The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encrypt...

  • Article
  • Open Access
14 Citations
2,711 Views
22 Pages

20 December 2022

The remote authentication scheme is a cryptographic protocol incorporated by user–server applications to prevent unauthorized access and security attacks. Recently, a two-factor authentication scheme using hard problems in elliptic curve crypto...

  • Article
  • Open Access
34 Citations
3,341 Views
18 Pages

Cryptanalysis and Improved Image Encryption Scheme Using Elliptic Curve and Affine Hill Cipher

  • Parveiz Nazir Lone,
  • Deep Singh,
  • Veronika Stoffová,
  • Deep Chandra Mishra,
  • Umar Hussain Mir and
  • Neerendra Kumar

19 October 2022

In the present era of digital communication, secure data transfer is a challenging task in the case of open networks. Low-key-strength encryption techniques incur enormous security threats. Therefore, efficient cryptosystems are highly necessary for...

  • Article
  • Open Access
23 Citations
2,685 Views
25 Pages

Privacy-Aware Secure Routing through Elliptical Curve Cryptography with Optimal RSU Distribution in VANETs

  • Ghadeer Ghazi Shayea,
  • Dheyaa Abdulameer Mohammed,
  • Ali Hashim Abbas and
  • Nejood Faisal Abdulsattar

1 December 2022

Vehicular Ad-Hoc Networks (VANETs) are the backbone of the intelligent transportation system, which consists of high-speed vehicles with huge dynamic mobility. The communication takes place with a vehicle-to-vehicle, vehicle to infrastructure, with t...

  • Article
  • Open Access
6 Citations
4,839 Views
16 Pages

Fast Implementation of NIST P-256 Elliptic Curve Cryptography on 8-Bit AVR Processor

  • Dong-won Park,
  • Nam Su Chang,
  • Sangyub Lee and
  • Seokhie Hong

9 December 2020

In this paper, we present a highly optimized implementation of elliptic curve cryptography (ECC) over NIST P-256 curve for an 8-bit AVR microcontroller. For improving the performance of ECC implementation, we focus on optimizing field arithmetics. In...

  • Proceeding Paper
  • Open Access
5 Citations
1,830 Views
11 Pages

25 December 2023

The end user has a cost-effective and cloud-based method of storing and retrieving their personal information through remote access using some kind of network connectivity. The user may view the data at any time and from any location they want. Howev...

  • Article
  • Open Access
20 Citations
5,635 Views
16 Pages

A Lightweight Authentication Protocol for UAVs Based on ECC Scheme

  • Shuo Zhang,
  • Yaping Liu,
  • Zhiyu Han and
  • Zhikai Yang

9 May 2023

With the rapid development of unmanned aerial vehicles (UAVs), often referred to as drones, their security issues are attracting more and more attention. Due to open-access communication environments, UAVs may raise security concerns, including authe...

  • Article
  • Open Access
16 Citations
3,262 Views
16 Pages

Enabling Secure Communication in Wireless Body Area Networks with Heterogeneous Authentication Scheme

  • Insaf Ullah,
  • Muhammad Asghar Khan,
  • Ako Muhammad Abdullah,
  • Fazal Noor,
  • Nisreen Innab and
  • Chien-Ming Chen

18 January 2023

Thanks to the widespread availability of Fifth Generation (5G) wireless connectivity, it is now possible to provide preventative or proactive healthcare services from any location and at any time. As a result of this technological improvement, Wirele...

of 3