Elliptic curves in Edwards form, known for their speed and efficiency, are highly promising for asymmetric cryptosystems. The CSIDH protocol is particularly notable for post-quantum cryptography. Recent studies classi...
详细信息
Elliptic Curve Cryptography (ECC) is extensively utilized in various security applications due to its high efficiency and security. The core operation in ECC, elliptic curve scalar multiplication, significantly impact...
详细信息
The advent of quantum computers spells doom for classical encryption schemes. Asymmetric key cryptosystems are easily solved by quantum computers using Shor's algorithm and Grover's algorithm in polynomial tim...
详细信息
One of the discrete subgroup of Euclidean space, known as Lattices, play a crucial part in the construction of post-quantum cryptographic ciphers. Unlike classical public-key schemes vulnerable to quantum attacks, cer...
详细信息
Big Data (BD) has attracted much attention from science and industry. Recent developments in BD have raised significant security issues and increased the risk of BD data privacy breaches. The novel reviews recent rese...
详细信息
Wireless data transmission across the air is quite common. Attackers have the ability to sniff all that data. To make sure only the actual recipient could decipher its contents, wireless encryption algorithms were int...
详细信息
Compared with traditional computing devices, IoT devices are often smaller in size, resulting in weaker battery power, memory, and computing power. Additionally, IoT devices have a higher frequency of data exchange an...
详细信息
This work considered the improvement of the RSA cryptosystem using a Secure Hash Algorithm, SHA-256, in its attempt to forestall attacks, more so against timing attacks. RSA is one of the most used asymmetric encrypti...
详细信息
Cryptography due to corresponding non-visual counter-intuitive mathematics is not a very suitable theme for basic general introductory applied mathematics courses for non-specialists. Still, according to the author...
详细信息
The integration of Mobile Ad-hoc Networks (MANETs) in the Industrial Internet of Things (IIoT) facilitates decentralized communication between smart devices, offering flexibility for diverse applications such as law e...
详细信息
暂无评论