Nothing Special   »   [go: up one dir, main page]

×
Please click here if you are not redirected within a few seconds.
This paper proposes a mutual authentication protocol based on. Hyperelliptic Curve Digital Signature Algorithm for a secure access in constrained devices which ...
This paper proposes a mutual authentication protocol based on Hyperelliptic Curve Digital Signature Algorithm for a secure access in constrained devices ...
This paper proposes a mutual authentication protocol based on Hyperelliptic Curve Digital Signature Algorithm for a secure access in constrained devices which ...
Hyperelliptic Curve Cryptosystem (HECC) is well suited for secure communication in wireless sensor network as limited resources (storage, time or power) on ...
People also ask
Section III briefly explains about Mutual authentication scheme using Hyperelliptic Curve. Cryptography. Section IV deals with results and discussion in this ...
The HEC perspective trend is used to ensure the maintenance of the security of LWE and to provide effective performance in computation and communication ...
2. Mutual Authentication Protocol Using Hyperelliptic Curve Cryptosystem in Constrained Devices. Kakali Chatterjee, Asok De, and Daya Gupta, Vol. 15, No. 1 ...
Our proposed scheme helps to achieve better security by employing Hyperelliptic Curve Cryptography. This paper shows the procedure to obtain mutual ...
Oct 5, 2021 · On the contrary, we find Hyperelliptic Curve Cryptosystem (HECC) is considered more suitable for securing communications in mobile and IoT ...
Jul 4, 2024 · An encryption system uses the hyperelliptic curve to minimize weight in code words that are hard to sample and make this encryption system ...