Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    A Low-Cost and High-Performance Cryptosystem Using Tripling-Oriented Elliptic Curve

    Mohammad Alkhatib*, Wafa S. Aldalbahy

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1807-1831, 2023, DOI:10.32604/iasc.2023.038927

    Abstract Developing a high-performance public key cryptosystem is crucial for numerous modern security applications. The Elliptic Curve Cryptosystem (ECC) has performance and resource-saving advantages compared to other types of asymmetric ciphers. However, the sequential design implementation for ECC does not satisfy the current applications’ performance requirements. Therefore, several factors should be considered to boost the cryptosystem performance, including the coordinate system, the scalar multiplication algorithm, and the elliptic curve form. The tripling-oriented (3DIK) form is implemented in this work due to its minimal computational complexity compared to other elliptic curves forms. This experimental study explores the factors playing an important role… More >

  • Open Access

    ARTICLE

    Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm

    K. Sudharson1,*, S. Arun2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1769-1784, 2022, DOI:10.32604/iasc.2022.026483

    Abstract Quantum Computing (QC). The content of node or sink nodes is processed using the fundamental principles of quantum mechanics. However, cryptography techniques face several other issues, such as availability, integrity, and vulnerability, to name a few. The researchers have overcome many obstacles, yet security remains a crucial concern in QC. However, experimenters recently discovered that the QC has a lot more data hacking than static networks. Moreover, the bitwise error is still present in implementing the Quantum Computing Cryptography Protocol (QCCP). Because all nodes are mobile and dynamic topology occurs, the proposed research uses the Quantum Elliptical Curve Cryptography (QECC)… More >

  • Open Access

    ARTICLE

    Text Encryption Using Pell Sequence and Elliptic Curves with Provable Security

    Sumaira Azhar1, Naveed Ahmed Azam2,*, Umar Hayat1

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4971-4988, 2022, DOI:10.32604/cmc.2022.023685

    Abstract The demand for data security schemes has increased with the significant advancement in the field of computation and communication networks. We propose a novel three-step text encryption scheme that has provable security against computation attacks such as key attack and statistical attack. The proposed scheme is based on the Pell sequence and elliptic curves, where at the first step the plain text is diffused to get a meaningless plain text by applying a cyclic shift on the symbol set. In the second step, we hide the elements of the diffused plain text from the attackers. For this purpose, we use… More >

  • Open Access

    ARTICLE

    A User Authentication Protocol Combined with the Trust Model, Biometrics and ECC for Wireless Sensor Networks

    Tao Liu, Gan Huang*, Ping Zhang

    Intelligent Automation & Soft Computing, Vol.24, No.3, pp. 519-529, 2018, DOI:10.31209/2018.100000019

    Abstract In this article, a new user authentication protocol using trust model, elliptic curve cryptography and biometrics for WSNs is submitted. The result of the trust model analysis indicates that the model can improve the model’s ability of withstanding attacks from the malicious nodes. The results of safety analysis and performance analysis for our proposed user authentication protocol demonstrate that this protocol can be flexible to all sorts of common known attacks and performs similarly or better compared with some active user authentication protocols. It is suitable for WSNs which have a prominent request for the security and the performance. More >

Displaying 1-10 on page 1 of 4. Per Page