research paper-computer science-cryptography
cryptography-2014
cryptography-research-papers-2011
Quantum cryptography
2012-cryptography
cryptography-research-papers-22
cryptography-research-papers-21
research-paper-and-project-in-cryptography-15
research-paper-and-project-in-cryptography-14
research-paper-and-project-in-cryptography-13
research-paper-and-project-in-cryptography-12
research-paper-and-project-in-cryptography-11
cryptography-research-papers-13
cryptography-research-papers-12
cryptography-research-papers-11
quantum-cryptography-63
decoy-state quantum-cryptography
free-space quantum-key-distribution
information-leakage-in-quantum-cryptography
experimental quantum-cryptography-2
experimental quantum-cryptography
cryptography-for network-security
medical-images-by-steganocryptography
visual-cryptography
visual-cryptography-2
visual-cryptography-3
visual-cryptography-4
visual-cryptography-5
steganography-cryptography-system
quantum-cryptography-real-implementation-problems
counter-factual quantum-cryptography
counter-factual quantum-cryptography-2
applications-to quantum-cryptography
metropolitan quantum-cryptography-network
hacking-commercial quantum-cryptography-systems
free-space-quantum-cryptography
quantum-cryptography-system-for-telecom-fiber-networks
perfect-eavesdropping-on-a quantum-cryptography-system
entropic-security-in quantum-cryptography
tolerable-error-rates-in quantum-cryptography
quantum-cryptography-as-a-retrodiction-problem
position-based quantum-cryptography
position-based quantum-cryptography-2
on-the-power-of-two-party quantum-cryptography
experimental quantum-cryptography-scheme-based-on-orthogonal-states
post-quantum-cryptography-lattice-signatures
algorithm-in quantum-cryptography
optimal-strategy-in quantum-cryptography
classical-and quantum-cryptography-services
single-photon-sources-for quantum-cryptography
distinguishability-of-gaussian-states-in quantum-cryptography-using-postselection
quantum-cryptography-04
quantum-cryptography-3
quantum-cryptography-3-2
verification-of quantum-cryptography-protocols-by-model-checking
introduction-to-post-quantum-cryptography
prototype-of-a quantum-cryptography-system-for-the-end-user
key-to-secure quantum-cryptography
towards-practical quantum-cryptography
quantum-cryptography-in-real-life-applications
cryptography-code-based-signatures
quantum-cryptography-aspects
new quantum-cryptography-protocols
quantum-cryptography-02
quantum-cloning-transformations-for quantum-cryptography
logic-functions-for cryptography a-tutorial
finite-field-multiplication-combining-amns-and-dft-approach-for-pairing cryptography
blind-source-separation-based cryptography-scheme-for-mobile-military-communication-applications
secure-localization-using-elliptic-curve cryptography-in-wireless-sensor-networks
iris-biometric cryptography-for-identity-document
algebraic-visual cryptography-scheme-for-color-images
symmetric-extendibility-for-qudits-and-tolerable-error-rates-in-quantum cryptography
provable-security-for-physical cryptography
provable-security-for-physical cryptography-2
lightweight cryptography-and-rfid-tackling-the-hidden-overheads
pseudo-dna cryptography-method
public-key cryptography-based-privacy-preserving-multi-context-rfid-infrastructure
on-the-security-of-1024-bit-rsa-and-160-bit-elliptic-curve cryptography
channel-coding-as-a cryptography-enhancer
perfect-eavesdropping-on-a-quantum cryptography-system
cryptanalysis-of-a-computer cryptography-scheme-based-on-a-filter-bank
vulnerability-bounds-and-leakage-resilience-of-blinded cryptography-under-timing-attacks
colour-visual cryptography-schemes
high-speed-elliptic-curve cryptography-accelerator-for-koblitz-curves
strengthen-cloud-computing-security-with-federal-identity-management-using-hierarchical-identity-basedcryptography
non-malleable-extractors-and-symmetric-key cryptography-from-weak-secrets
non-malleable-extractors-and-symmetric-key cryptography-from-weak-secrets-2
security-bounds-for-quantum cryptography-with-finite-resources
complementarity-of-private-and-correctable-subsystems-in-quantum cryptography-and-error-correction
ultra-lightweight cryptography-for-resource-constrained-devices
efficient-public-key cryptography-in-the-presence-of-key-leakage
analysis-of-public-key cryptography-for-wireless-sensor-networks-security
endomorphisms-for-faster-elliptic-curve cryptography-on-a-large-class-of-curves
cryptography-from-noisy-storage
general-theory-of-decoy-state-quantum cryptography-with-source-errors
on-lattices-learning-with-errors-random-linear-codes-and cryptography
de-finetti-representation-theorem-for-infinite-dimensional-quantum-systems-and-applications-to-quantum cryptography
continuous-variable-quantum cryptography-using-two-way-quantum-communication
practical-symmetric-key cryptography-on-modern-graphics-hardware
exploiting-the-power-of-gpus-for-asymmetric cryptography
on cryptography-with-auxiliary-input
leakage-resilient-public-key cryptography-in-the-bounded-retrieval-model
some-aspects-of-quantum-cryptography-and network-security
some-aspects-of-quantum-cryptography-and network-security-2
cryptography-for network-security-failures-successes-and-challenges
cryptography-research-papers-2011-section-3
cryptography-research-papers-2011-section-2
Related
- Quantum cryptography-3
- Quantum cryptography-3
- Quantum cryptography in real life applications
- metropolitan quantum cryptography network
- research papers on distributed systems
elliptic curve cryptography-2013 research papers
A Survey of Low Power Elliptic Curve Cryptography for Smart Network
free download
ABSTRACT The proposed project is to implement a novel idea in Sensor networks. Normally Sensor networks are used to sense environment and collect data. Security in such networks is a big challenge. The first challenges of security in sensor networks lie in the conflicting
PHYSIOLOGICAL VALUE BASED PRIVACY PRESERVATION OF PATIENT'S DATA USINGELLIPTIC CURVE CRYPTOGRAPHY
free download
Abstract Body Sensor Network (BSN) is a suitable combination of wearable tiny devices attached to patient's body. Their purpose is to monitor patient's physiological data (or BSN data) values. Sensors continuously monitor and collect patient's data and send it to a
Efficient Encryption Scheme based on Elliptic Curve Cryptography (ECC) and Symmetric algorithm in Wireless Body Area Networks (WBANs)
free download
ABSTRACT. In this paper, we present efficient encryption scheme based on Elliptic Curve Cryptography (ECC) to protect patient's medical data in healthcare system. The proposed scheme used the symmetric cipher algorithm (ie, DES, modified Feistel algorithm, etc.) to
Elliptic Curve Cryptography in Practice
free download
Abstract. In this paper, we perform a review of elliptic curve cryptography (ECC), as it is used in practice today, in order to reveal unique mistakes and vulnerabilities that arise in implementations of ECC. We study four popular protocols that make use of this type of
DESIGN OF MOBILE PUBLIC KEY INFRASTRUCTURE (M-PKI) USING ELLIPTIC CURVE CRYPTOGRAPHY
free download
ABSTRACT Recently the demand of mobile phones and their applications are increasing rapidly and as a result, it becomes essential to design and/or improve the existing PKI (Public Key Infrastructure) useful for mobile phones or devices. Since a mobile phone has
An Efficient Scalar Multiplication Algorithm for Elliptic Curve Cryptography Using a New Signed-Digit Representation
free download
Abstract. This paper presents and evaluates a novel encoding algorithm to reduce the Hamming weight of the scalar. The scalar multiplication is modified to utilize this new scalar representation. The results show that the computation cost (the number of required clock
An Improved Remote User Authentication Scheme with Elliptic Curve Cryptography and Smart Card without using Bilinear Pairings
free download
ABSTRACT Login to the remote server over unreliable insecure network demands secured password a secured password authentication with less computational cost. We have proposed a remote user authentication scheme based on ECC that establish strong
Fast Software Implementation of Binary Elliptic Curve Cryptography
free download
ABSTRACT. This paper presents an efficient and side channel protected software implementation of point multiplication for the standard NIST and SECG binary elliptic curves. The enhanced performance is achieved by improving the Lopez-Dahab/Montgomery
Complete and Unified Group Laws are not Enough for Elliptic Curve Cryptography.
free download
ABSTRACT We analyze four recently proposed normal forms for elliptic curves. Though these forms are mathematically appealing and exhibit some cryptographically desirable properties, they nonetheless fall short of cryptographic viability, especially when
Elliptic Curve Cryptography in Securing Networks by Mobile Authentication
free download
Abstract This paper proposes an enhanced authentication model, which is suitable for low- power mobile devices. It uses an Extended Password Key Exchange Protocols and elliptic-curve-cryptosystem based trust delegation mechanism to generate a delegation
Prospective Utilization of Elliptic Curve Cryptography for Security Enhancement
free download
Abstract Now a days Elliptic curve cryptography (ECC) is the most efficient public key encryption scheme based on elliptic curve concepts that can be used to create faster, smaller, and efficient cryptographic keys. ECC generates keys through the properties of
An Enhanced Opass With Modified Elliptic Curve Cryptography-Based User Authentication Scheme For Grid Computing
free download
ABSTRACT User authentication to an open server or a system based on username and password is familiar to access the control. Entering the username and password in an untruthful computer is impulse to avert from involuntary exposure through phishing,
Binary Edwards Curves in Elliptic Curve Cryptography
free download
Edwards curves are a new normal form for elliptic curves that exhibit some cryptographically desirable properties and advantages over the typical Weierstrass form. Because the group law on an Edwards curve (normal, twisted, or binary) is complete and unified,
Comprehensive Security System for Mobile Network Using Elliptic Curve Cryptography over GF (p)
free download
ABSTRACT Mobile devices have many differences in their capabilities, computational powers and security requirements. Mobile devices can be used as the enabling technology for accessing Internet based services, as well as for personal communication needs in