Analysis of elliptic curve cryptography & RSA

MR Khan, K Upreti, MI Alam, H Khan… - Journal of ICT …, 2023 - ieeexplore.ieee.org
In today's digital world, the Internet is an essential component of communication networks. It
provides a platform for quickly exchanging information among communicating parties. There …

Secure IoT framework for authentication and confidentiality using hybrid cryptographic schemes

S Ali, F Anwer - International Journal of Information Technology, 2024 - Springer
IoTs are increasingly gaining popularity and prevalence due to their extensive applications
across various domains. They gather data from the real environment and transmit it through …

A Comprehensive analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges

D Ramakrishna, MA Shaik - IEEE Access, 2024 - ieeexplore.ieee.org
Cryptographic techniques are reviewed in this literature study, with particular attention paid
to their applicability, Importance, contributions, And field strengths. These algorithms include …

Lightweight Secure and Scalable Scheme for Data Transmission in the Internet of Things

I Al-Hejri, F Azzedin, S Almuhammadi… - Arabian Journal for …, 2024 - Springer
Abstract The Internet of Things (IoT) is rapidly permeating critical domains, enabling the
interconnection and utilization of diverse devices on a large scale while streaming vast …

IoT-based secure luggage storage kiosk

A Subash, CSA Danny, M Vijayalakshmi - International Journal of …, 2023 - Springer
This project aims to solve the problem of securely storing and retrieving luggage in popular
public places. There have been various methods that solve the above problem but there is a …

A Robust and Fast Symmetric Text Encryption Algorithm Based on Fermat's Two Squares Theorem

MR Kumar, R Mani, P Revathi… - … on Recent Advances …, 2023 - ieeexplore.ieee.org
In the digital age, the integrity and privacy of information transmitted, communicated over
computer networks or stored on computer systems are crucial. This paper suggests a novel …

Improved resilience of secret sharing scheme with augmented multifarious features

S Patil, S Bhandari, S Thepade, R Raut… - International Journal of …, 2022 - Springer
The requirement of greater flexibility and additional functionality in conventional secret
sharing schemes is posed in many practical applications. To meet the flexibility …

The use of chaotic pseudo random number and elliptic curve cryptosystem in an efficient OTP-based authentication scheme for online learning system

A Panja, S Karforma, S Mondal - International Journal of Information …, 2024 - Springer
The rapid advancement of Internet technology has led to an extensive increase in the
popularity of online learning, also known as online learning. Despite the numerous …

Hierarchical signature scheme based on elliptic curve digital signature algorithm

M Chintamani, P Paul, L Sa, B Sahu - International Journal of Information …, 2024 - Springer
In this article, we have proposed a hierarchical signature scheme based on Elliptic Curve
Digital Signature Algorithm. The motivation for our proposed signature scheme is from a …

Securing IoT Data: A Hybrid Cryptographic Approach

S Ali, F Anwer - … 11th International Conference on Computing for …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) refers to a system of interconnected physical objects globally
linked to each other through the internet. The IoT envisions connecting trillions of smart …