Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    A Coprocessor Architecture for 80/112-bit Security Related Applications

    Muhammad Rashid*, Majid Alotaibi

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6849-6865, 2023, DOI:10.32604/cmc.2023.032849

    Abstract We have proposed a flexible coprocessor key-authentication architecture for 80/112-bit security-related applications over field by employing Elliptic-curve Diffie Hellman (ECDH) protocol. Towards flexibility, a serial input/output interface is used to load/produce secret, public, and shared keys sequentially. Moreover, to reduce the hardware resources and to achieve a reasonable time for cryptographic computations, we have proposed a finite field digit-serial multiplier architecture using combined shift and accumulate techniques. Furthermore, two finite-state-machine controllers are used to perform efficient control functionalities. The proposed coprocessor architecture over and is programmed using Verilog and then implemented on Xilinx Virtex-7 FPGA (field-programmable-gate-array) device. For and ,… More >

  • Open Access

    ARTICLE

    A Secure Hardware Implementation for Elliptic Curve Digital Signature Algorithm

    Mouna Bedoui1,*, Belgacem Bouallegue1,2, Abdelmoty M. Ahmed2, Belgacem Hamdi1,3, Mohsen Machhout1, Mahmoud1, M. Khattab2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2177-2193, 2023, DOI:10.32604/csse.2023.026516

    Abstract Since the end of the 1990s, cryptosystems implemented on smart cards have had to deal with two main categories of attacks: side-channel attacks and fault injection attacks. Countermeasures have been developed and validated against these two types of attacks, taking into account a well-defined attacker model. This work focuses on small vulnerabilities and countermeasures related to the Elliptic Curve Digital Signature Algorithm (ECDSA) algorithm. The work done in this paper focuses on protecting the ECDSA algorithm against fault-injection attacks. More precisely, we are interested in the countermeasures of scalar multiplication in the body of the elliptic curves to protect against… More >

  • Open Access

    ARTICLE

    Managed Pressure Drilling Technology: A Research on the Formation Adaptability

    Chenglong Wang1, Hexing Liu1, Yaya Liu1, Xi Xia2, Fan Xiao3,*, Ningyu Zheng3

    FDMP-Fluid Dynamics & Materials Processing, Vol.18, No.6, pp. 1865-1875, 2022, DOI: 10.32604/fdmp.2022.021668

    Abstract Existing pressure drilling technologies are based on different principles and display distinct characteristics in terms of control pressure and degree of formation adaptability. In the present study, the constant-bottom-hole-pressure (CBHP) and controlled-mud-level (CML) dual gradient drilling methods are considered. Models for the equivalent circulating density (ECD) are introduced for both drilling methods, taking into account the control pressure parameters (wellhead back pressure, displacement, mud level, etc.) and the relationship between the equivalent circulating density curve in the wellbore and two different types of pressure profiles in deep-water areas. The findings suggest that the main pressure control parameter for CBHP drilling… More >

Displaying 1-10 on page 1 of 3. Per Page