Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (29)
  • Open Access

    ARTICLE

    Asymmetric Key Cryptosystem for Image Encryption by Elliptic Curve over Galois Field

    Mohammad Mazyad Hazzazi1, Hafeez Ur Rehman2,*, Tariq Shah2, Hajra Younas2

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2033-2060, 2023, DOI:10.32604/cmc.2023.040629

    Abstract Protecting the integrity and secrecy of digital data transmitted through the internet is a growing problem. In this paper, we introduce an asymmetric key algorithm for specifically processing images with larger bit values. To overcome the separate flaws of elliptic curve cryptography (ECC) and the Hill cipher (HC), we present an approach to picture encryption by combining these two encryption approaches. In addition, to strengthen our scheme, the group laws are defined over the rational points of a given elliptic curve (EC) over a Galois field (GF). The exclusive-or (XOR) function is used instead of matrix multiplication to encrypt and… More >

  • Open Access

    ARTICLE

    A Low-Cost and High-Performance Cryptosystem Using Tripling-Oriented Elliptic Curve

    Mohammad Alkhatib*, Wafa S. Aldalbahy

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1807-1831, 2023, DOI:10.32604/iasc.2023.038927

    Abstract Developing a high-performance public key cryptosystem is crucial for numerous modern security applications. The Elliptic Curve Cryptosystem (ECC) has performance and resource-saving advantages compared to other types of asymmetric ciphers. However, the sequential design implementation for ECC does not satisfy the current applications’ performance requirements. Therefore, several factors should be considered to boost the cryptosystem performance, including the coordinate system, the scalar multiplication algorithm, and the elliptic curve form. The tripling-oriented (3DIK) form is implemented in this work due to its minimal computational complexity compared to other elliptic curves forms. This experimental study explores the factors playing an important role… More >

  • Open Access

    ARTICLE

    Smart Grid Communication Under Elliptic Curve Cryptography

    B. Prabakaran1,*, T. R. Sumithira2, V. Nagaraj3

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 2333-2347, 2023, DOI:10.32604/iasc.2023.029725

    Abstract Smart Grids (SGs) are introduced as a solution for standard power distribution. The significant capabilities of smart grids help to monitor consumer behaviors and power systems. However, the delay-sensitive network faces numerous challenges in which security and privacy gain more attention. Threats to transmitted messages, control over smart grid information and user privacy are the major concerns in smart grid security. Providing secure communication between the service provider and the user is the only possible solution for these security issues. So, this research work presents an efficient mutual authentication and key agreement protocol for smart grid communication using elliptic curve… More >

  • Open Access

    ARTICLE

    Cryptographic Algorithm for Enhancing Data Security in Wireless IoT Sensor Networks

    A. Bhavani, V. Nithya*

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1381-1393, 2023, DOI:10.32604/iasc.2023.029397

    Abstract Wireless IoT Sensor Network can handle audio, video, text, etc., through the interconnection of ubiquitous devices. The entertainment and application-centric network relies on its autonomous nodes for handling large streams of multimedia data. Security breaches and threats due to insider attacks reduce the data handling and distribution capacity of the nodes. For addressing the insider attacks problem, Session-Critical Distributed Authentication Method (SCDAM) is proposed. The proposed method relies on short-lived concealed authentication based on an improved elliptic curve cryptography (ECC) algorithm. In this authentication, the session time and the interrupts are accounted for, providing end-to-end authentication. The session keys are… More >

  • Open Access

    ARTICLE

    Modified Elliptic Curve Cryptography Multi-Signature Scheme to Enhance Security in Cryptocurrency

    G. Uganya*, Radhika Baskar

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 641-658, 2023, DOI:10.32604/csse.2023.028341

    Abstract Internet of Things (IoT) is an emerging technology that moves the world in the direction of smart things. But, IoT security is the complex problem due to its centralized architecture, and limited capacity. So, blockchain technology has great attention due to its features of decentralized architecture, transparency, immutable records and cryptography hash functions when combining with IoT. Cryptography hash algorithms are very important in blockchain technology for secure transmission. It converts the variable size inputs to a fixed size hash output which is unchangeable. Existing cryptography hash algorithms with digital signature have issues of single node accessibility and accessed up… More >

  • Open Access

    ARTICLE

    A Secure Hardware Implementation for Elliptic Curve Digital Signature Algorithm

    Mouna Bedoui1,*, Belgacem Bouallegue1,2, Abdelmoty M. Ahmed2, Belgacem Hamdi1,3, Mohsen Machhout1, Mahmoud1, M. Khattab2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2177-2193, 2023, DOI:10.32604/csse.2023.026516

    Abstract Since the end of the 1990s, cryptosystems implemented on smart cards have had to deal with two main categories of attacks: side-channel attacks and fault injection attacks. Countermeasures have been developed and validated against these two types of attacks, taking into account a well-defined attacker model. This work focuses on small vulnerabilities and countermeasures related to the Elliptic Curve Digital Signature Algorithm (ECDSA) algorithm. The work done in this paper focuses on protecting the ECDSA algorithm against fault-injection attacks. More precisely, we are interested in the countermeasures of scalar multiplication in the body of the elliptic curves to protect against… More >

  • Open Access

    ARTICLE

    Discrete GWO Optimized Data Aggregation for Reducing Transmission Rate in IoT

    S. Siamala Devi1, K. Venkatachalam2, Yunyoung Nam3,*, Mohamed Abouhawwash4,5

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 1869-1880, 2023, DOI:10.32604/csse.2023.025505

    Abstract The conventional hospital environment is transformed into digital transformation that focuses on patient centric remote approach through advanced technologies. Early diagnosis of many diseases will improve the patient life. The cost of health care systems is reduced due to the use of advanced technologies such as Internet of Things (IoT), Wireless Sensor Networks (WSN), Embedded systems, Deep learning approaches and Optimization and aggregation methods. The data generated through these technologies will demand the bandwidth, data rate, latency of the network. In this proposed work, efficient discrete grey wolf optimization (DGWO) based data aggregation scheme using Elliptic curve Elgamal with Message… More >

  • Open Access

    ARTICLE

    Mordell Elliptic Curve Based Design of Nonlinear Component of Block Cipher

    Hafeez ur Rehman1,*, Tariq Shah1, Mohammad Mazyad Hazzazi2, Ali Alshehri3, Bassfar Zaid4

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2913-2930, 2022, DOI:10.32604/cmc.2022.028765

    Abstract Elliptic curves (ECs) are deemed one of the most solid structures against modern computational attacks because of their small key size and high security. In many well-known cryptosystems, the substitution box (S-box) is used as the only nonlinear portion of a security system. Recently, it has been shown that using dynamic S-boxes rather than static S-boxes increases the security of a cryptosystem. The conferred study also extends the practical application of ECs in designing the nonlinear components of block ciphers in symmetric key cryptography. In this study, instead of the Mordell elliptic curve (MEC) over the prime field, the Galois… More >

  • Open Access

    ARTICLE

    Data Mining with Privacy Protection Using Precise Elliptical Curve Cryptography

    B. Murugeshwari1,*, D. Selvaraj2, K. Sudharson3, S. Radhika4

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 839-851, 2023, DOI:10.32604/iasc.2023.028548

    Abstract Protecting the privacy of data in the multi-cloud is a crucial task. Data mining is a technique that protects the privacy of individual data while mining those data. The most significant task entails obtaining data from numerous remote databases. Mining algorithms can obtain sensitive information once the data is in the data warehouse. Many traditional algorithms/techniques promise to provide safe data transfer, storing, and retrieving over the cloud platform. These strategies are primarily concerned with protecting the privacy of user data. This study aims to present data mining with privacy protection (DMPP) using precise elliptic curve cryptography (PECC), which builds… More >

  • Open Access

    ARTICLE

    Automated Irrigation System Using Improved Fuzzy Neural Network in Wireless Sensor Networks

    S. Sakthivel1, V. Vivekanandhan2,*, M. Manikandan2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 853-866, 2023, DOI:10.32604/iasc.2023.026289

    Abstract Irrigation plays a significant role in various agricultural cropping methods deployed in semiarid and arid regions where valuable water applications and managing are considered crucial concerns. Multiple factors such as weather, soil, water, and crop data need to be considered for irrigation maintenance in an efficient besides uniform manner from multifaceted and different information-based systems. A Multi-Agent System (MAS) has been proposed recently based on diverse agent subsystems with definite objectives for attaining global MAS objective and is deployed on Cloud Computing paradigm capable of gathering information from Wireless Sensor Networks (WSNs) positioned in rice, cotton, cassava crops for knowledge… More >

Displaying 1-10 on page 1 of 29. Per Page