Zobrazeno 1 - 10
of 22
pro vyhledávání: '"G. Leelavathi"'
Publikováno v:
International Journal of Intelligent Networks, Vol 2, Iss , Pp 184-194 (2021)
In order to enhance the speed with good flexibility and physical security of design it is required to implement public key cryptographic algorithm on reconfigurable devices. The dedicated accelerators or coprocessors are combined with hardware soluti
Externí odkaz:
https://doaj.org/article/175ed8850ae641d491eb7318237b899b
Publikováno v:
International Journal of Intelligent Systems and Applications in Engineering; Vol. 11 No. 9s (2023): Articles in Press; 80-93
Person Re-identification (Re-id) is helpful in society for non-invasive biometric person identification, validation, and surveillance, in crowded places. This paper proposes person reidentification based on Enhanced Position-Regularization Generative
Publikováno v:
Journal of The Institution of Engineers (India): Series B. 103:1687-1697
Publikováno v:
International Journal of Engineering and Technology. 9:773-796
Publikováno v:
EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing ISBN: 9783030195618
This work proposes encryption of text data and image by embedding data as elliptic curve point. Elliptic curve cryptography (ECC) is selected to satisfy the constraints of wireless sensor networks due to its high security for smaller key bit length.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::85253310e975ed2a16a512d1798ff8f3
https://doi.org/10.1007/978-3-030-19562-5_33
https://doi.org/10.1007/978-3-030-19562-5_33
Publikováno v:
ICIIS
Resource constraint Wireless Sensor Networks requires the fast multipliers that are crucial for data processing. Scalar or Point multiplication, the most important operation of Elliptic Curve Cryptography (ECC) is carried out with Montgomery Multipli
Publikováno v:
ICCCNT
Cryptographic algorithms are fundamental to the secure communications over Wireless Sensor Networks. This paper presents complete public key cryptosystem with mathematical model essential for designing a cryptographic algorithm that integrates probab
Design and Implementation of Montgomery Multipliers in RSA Cryptography for Wireless Sensor Networks
Publikováno v:
Proceedings of First International Conference on Smart System, Innovations and Computing ISBN: 9789811058271
In this work, the architecture and modeling of two different RSA encryption and decryption public key systems are presented, for a key size of 128 bits. The systems that require different levels of security can be utilized easily by changing the key
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::358e3a5efe1d2482f71cc54f582d1755
https://doi.org/10.1007/978-981-10-5828-8_54
https://doi.org/10.1007/978-981-10-5828-8_54
Publikováno v:
2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).
Due to the resource constraints of Wireless Sensor Nodes the fast multipliers are essential for data processing. In this paper, we propose the RSA processor using Vedic multiplication technique that achieves considerable speed and with reduced area u
Publikováno v:
International Journal of Vehicle Information and Communication Systems. 5:11
This work proposes encryption of text and image data, embedding as elliptic curve point. Finite field arithmetic is utilised efficiently in this reconfigurable crypto system. Pre-computations for text data and image input conversion is done using MAT