Elliptic curve scalar multiplication (ECSM) stands as a crucial subblock in elliptic curve cryptography (ECC), which represents the most widely used prequantum public key …
B Rashidi - International Journal of Circuit Theory and …, 2023 - Wiley Online Library
In this paper, the error‐correcting 4‐bit S‐boxes for cryptography applications with multiple error detection and correction are presented. Three 4‐bit S‐boxes which are used in the …
Elliptic curves cryptography, the most widely-deployed pre-quantum public key cryptography, can be implemented efficiently with Koblitz curves. The reason for these …
Z Tao, R Sun, J Dong - 2023 10th International Conference on …, 2023 - ieeexplore.ieee.org
Most modern processors utilize Dynamic Voltage and Frequency Scaling (DVFS) technology to dynamically adjust voltage and frequency according to the workloads of processors to …
H Tan, P Gao, T Chen, F Song, Z Wu - arXiv preprint arXiv:2307.00561, 2023 - arxiv.org
Fault injection attacks represent a type of active, physical attack against cryptographic circuits. Various countermeasures have been proposed to thwart such attacks, the design …
R Vishwakarma, R Monani, A Rezaei… - … on Quality Electronic …, 2023 - ieeexplore.ieee.org
The Global Wearable market is anticipated to rise at a considerable rate in the next coming years and communication is a fundamental block in any wearable device. In communication …
Most safety-critical edge-computing devices rely on lightweight cryptography (LWC) algorithms to provide security at minimum power and performance overhead. LWC …
B Paul, G Trivedi - … of 7th ASRES International Conference on …, 2023 - books.google.com
Recent development in the field of quantum computing pushed classical cryptosystem on the verge of serious security threat. Quantum cryptography employing quantum channel and …