Provable secure lightweight hyper elliptic curve‐based communication system for wireless sensor networks

VS Naresh, R Sivaranjani… - International Journal of …, 2018 - Wiley Online Library
It is widely believed that hyper elliptic curve cryptosystems (HECCs) are not attractive for
wireless sensor network because of their complexity compared with systems based on lower …

An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography

SA Ch, N Uddin, M Sher, A Ghani, H Naqvi… - Multimedia Tools and …, 2015 - Springer
The need for Lightweight cryptography is on the rise as transition has been made from wired
to wireless network. Wireless systems inherently are insecure and resource (power) …

A Novel Provable Secured Signcryption Scheme 𝒫𝒮𝒮𝒮: A Hyper-Elliptic Curve-Based Approach

I Ullah, NU Amin, J Khan, M Rehan, M Naeem… - Mathematics, 2019 - mdpi.com
Rivest, Shamir, & Adleman (RSA), bilinear pairing, and elliptic curve are well-known
techniques/algorithms for security protocols. These techniques suffer from higher …

A lightweight and secure attribute-based multi receiver generalized signcryption scheme for body sensor networks

J Iqbal, A Waheed, M Zareei, AI Umar, NU Amin… - IEEE …, 2020 - ieeexplore.ieee.org
With the rising number of patients along with the same time, the comparative evolution in
wireless technology has made Body Sensor Networks (BSNs) flourishing in the market. In …

Public verifiable signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem

S Ashraf Ch, Nizamuddin, M Sher - … 2012, Grenoble, France, March 28-30 …, 2012 - Springer
Signcryption is a process of combining encryption and signature into a single logical step.
Traditional signcryption schemes provide message confidentiality and sender …

[HTML][HTML] A forward secure signcryption scheme with ciphertext authentication for e-payment systems using conic curve cryptography

RM Daniel, EB Rajsingh, S Silas - … of King Saud University-Computer and …, 2021 - Elsevier
Signcryption is an authenticated encryption technique that concurrently establishes
message confidentiality, authenticity, integrity and non-repudiation. In this paper, we …

[PDF][PDF] A Novel Provable Secured Signcryption Scheme 𝓟𝓢𝓢𝓢: A Hyper-Elliptic Curve-Based Approach

I Ullah, NU Amin, M Naeem, H Khattak, SJ Khattak… - academia.edu
Rivest, Shamir, & Adleman (RSA), bilinear pairing, and elliptic curve are well-known
techniques/algorithms for security protocols. These techniques suffer from higher …

[PDF][PDF] Accelerating Digital Forensics through Parallel Computing.

GF El-Kabbany, M Rasslan, HK Aslan - J. Comput. Sci., 2018 - academia.edu
Digital crimes in the era of big data and cloud computing imposes significant challenges in
digital forensics. Cloud environment provides low cost, easy management and reasonable …

[PDF][PDF] Computer and Information Sciences

RM Daniel, EB Rajsingh, S Silas - 2018 - researchgate.net
abstract Signcryption is an authenticated encryption technique that concurrently establishes
message confidentiality, authenticity, integrity and non-repudiation. In this paper, we …