Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey

S Ullah, J Zheng, N Din, MT Hussain, F Ullah… - Computer Science …, 2023 - Elsevier
Elliptic Curve (EC) is the most recent and advanced technique of Elliptic Curve
Cryptography (ECC). EC is often used to improve the security of open communication …

Authenticated wireless links between a drone and sensors using a blockchain: Case of smart farming

KS Alqarni, FA Almalki, BO Soufiene… - Wireless …, 2022 - Wiley Online Library
Agriculture is confronted with several significant difficulties, such as rising air temperatures
and population growth, causing the implementation of smart farming operations as an …

Cryptography in blockchain

A Tiwari - Distributed Computing to Blockchain, 2023 - Elsevier
Blockchain is emerging as one the most promising and revolutionary technologies in the
present world. Though blockchain at the onset was majorly associated with financial …

Proposal of a lightweight differential power analysis countermeasure method on elliptic curves for low-cost devices

S Gabsi, Y Kortli, V Beroulle, Y Kieffer… - Multimedia Tools and …, 2024 - Springer
Elliptical curves are dedicated for several security applications including Radio Frequency
Identification (RFID) devices, smart cards, bankcards, etc. To guarantee effective security of …

[HTML][HTML] A novel low-area point multiplication architecture for elliptic-curve cryptography

M Rashid, MM Hazzazi, SZ Khan, AR Alharbi, A Sajid… - Electronics, 2021 - mdpi.com
This paper presents a Point Multiplication (PM) architecture of Elliptic-Curve Cryptography
(ECC) over GF (2 163) with a focus on the optimization of hardware resources and latency at …

[HTML][HTML] Editable and verifiable anonymous authentication incorporating blockchain in the internet of energy

Q Zhang, F Bai, Z Yu, Y Liu, T Shen, A Xie, L Huang - Electronics, 2022 - mdpi.com
With the continuous development of the Internet of Energy, the access of a large number of
distributed renewable energy has caused difficulties in energy management. The traditional …

Freshness and Security-Aware Cache Update in Blockchain-Based Vehicular Edge Networks

P Dai, Y Huang, X Wu, K Li, H Xing… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Vehicular Edge Computing (VEC) integrated with blockchain technology holds great
promise for delivering secure temporal data services. However, ensuring data freshness in …

Virtual Threats and Asymmetric Military Challenges

CVS Babu, PM Akshara - Cyber Security Policies and Strategies of …, 2023 - igi-global.com
Security challenges are faced by every single country on this planet. These threats can
occur through violent non-state habitats, any organized group of criminals, economic threats …

Study of Cryptographic Techniques Adopted in Blockchain

S Ahmad, SK Arya, S Gupta, P Singh… - 2023 4th International …, 2023 - ieeexplore.ieee.org
This study investigates how blockchain, a decentralized ledger technology that has
garnered popularity due to its potential to revolutionize industries, uses cryptography …

[HTML][HTML] Prospects of digital scientific publishing on blockchain: The concept of DAP

K Skala, Z Šojat, J Maričević… - Open …, 2023 - open-research-europe.ec.europa.eu
Background: Traditional publishing models, open access and major publishers, cannot
adequately address the key challenges of academic publishing today: Speed of peer review …