A comprehensive survey on lightweight asymmetric key cryptographic algorithm for resource constrained devices

ADD Sundararajan, R Rajashree - ECS Transactions, 2022 - iopscience.iop.org
Elliptic Curve Cryptography, a popular lightweight asymmetric key cryptographic algorithm,
widely adapted to meet the high-security requirement of resource-constrained devices …

Distributed ledger technology for securing IoT

SS Panda, BK Mohanta, MR Dey… - 2020 11th …, 2020 - ieeexplore.ieee.org
Computing and communication are getting increasingly ubiquitous with the inclusion of
sophisticated devices like electric vehicles, smart phones and other house hold appliances …

Performance analysis of a selective encryption algorithm for wireless ad hoc networks

Y Ren, A Boukerche, L Mokdad - 2011 IEEE Wireless …, 2011 - ieeexplore.ieee.org
Symmetric key algorithms are a typically efficient and fast cryptosystem, so it has significant
applications in many realms. For a wireless ad hoc network with constraint computational …

[PDF][PDF] Performance evaluation and comparison of algorithms for elliptic curve cryptography with El-Gamal based on MIRACL and RELIC libraries

DF Pigatto, NBF da Silva… - Journal of Applied …, 2011 - academia.edu
This paper presents a comparison between two implementations of the elliptic curve
cryptography (ECC) algorithm based on El-Gamal. Each implementation uses different …

The HAMSTER Data Communication Architecture for Unmanned Aerial, Ground and Aquatic Systems: Aims, Scope and Definitions

DF Pigatto, L Gonçalves, GF Roberto… - Journal of Intelligent & …, 2016 - Springer
This paper presents HAMSTER, the HeAlthy, Mobility and Security based data
communication archiTEctuRe. HAMSTER is designed for Unmanned Vehicles and …

Parallel long messages encryption scheme based on certificateless cryptosystem for big data

X Wu, Y Han, M Zhang, S Zhu - … Conference, Inscrypt 2017, Xi'an, China …, 2018 - Springer
In big data environment, the quantity of generated and stored data is huge, and the size is
larger than before. A general solution to encrypt large messages is to adopt the hybrid …

An enhanced elliptic curve cryptography for biometric

OS Althobaiti, HA Aboalsamh - 2012 7th International …, 2012 - ieeexplore.ieee.org
Cryptography is one of the important sciences in the current era. The importance of
cryptography comes from the intensive digital transactions which we daily perform on the …

Integrating Machine Learning with Blockchain to Ensure Data Privacy

SS Singhar, D Jena, S Sharma - 2020 11th International …, 2020 - ieeexplore.ieee.org
Nowadays data is collected without any specific purpose, every activity of a machine or a
human being is recorded, If needed in the future then the data will be analyzed. But here the …

Notice of Removal: New proposed Z-transform based encryption algorithm

F Al-Anzi, M Al-Enezi, J Soni - 2016 6th International Conference on …, 2016 - computer.org
The foremost aim of designing of any encryption algorithm must be security against unlawful
attacks. However, performance and the cost of implementation could be some another …

Segurança em sistemas embarcados críticos-utilização de criptografia para comunicação segura

DF Pigatto - 2012 - teses.usp.br
Este trabalho contempla o estudo de algoritmos criptográficos para assegurar a
comunicação entre sistemas embarcados críticos tendo em vista o grande crescimento na …