Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Mohamad Ali Mehrabi"'
Autor:
Mohamad Ali Mehrabi, Christophe Doche
Publikováno v:
Information, Vol 10, Iss 9, p 285 (2019)
Twisted Edwards curves have been at the center of attention since their introduction by Bernstein et al. in 2007. The curve ED25519, used for Edwards-curve Digital Signature Algorithm (EdDSA), provides faster digital signatures than existing schemes
Externí odkaz:
https://doaj.org/article/e4bbe33dc8d8478596f54d2aeecb438f
Autor:
Mohamad Ali Mehrabi
Publikováno v:
Cryptography, Vol 3, Iss 2, p 14 (2019)
Modular reduction of large values is a core operation in most common public-key cryptosystems that involves intensive computations in finite fields. Within such schemes, efficiency is a critical issue for the effectiveness of practical implementation
Externí odkaz:
https://doaj.org/article/b417ced18393423180bd50faea352234
Publikováno v:
Applied Sciences, Vol 9, Iss 1, p 64 (2018)
Security of embedded systems is the need of the hour. A mathematically secure algorithm runs on a cryptographic chip on these systems, but secret private data can be at risk due to side-channel leakage information. This research focuses on retrieving
Externí odkaz:
https://doaj.org/article/b8ff831dd3644ce09a9aae85fc54aec0
Autor:
Mohamad Ali Mehrabi, Alireza Jolfaei
Publikováno v:
ACM Transactions on Internet Technology. 22:1-16
An important security requirement in automotive networks is to authenticate, sign, and verify thousands of short messages per second by each vehicle. This requirement mandates the use of a high speed Elliptic Curve Cryptography (ECC) hardware. The Re
Publikováno v:
ACM Transactions on Internet Technology. 21:1-20
Many Internet of Things applications in smart cities use elliptic-curve cryptosystems due to their efficiency compared to other well-known public-key cryptosystems such as RSA. One of the important components of an elliptic-curve-based cryptosystem i
Publikováno v:
IEEE Transactions on Computers. 69:1707-1718
In today's technology, a sheer number of Internet of Things applications use hardware security modules for secure communications. The widely used algorithms in security modules, for example, digital signatures and key agreement, are based upon ellipt
Autor:
Christophe Doche, Mohamad Ali Mehrabi
Publikováno v:
Information, Vol 10, Iss 9, p 285 (2019)
Information
Volume 10
Issue 9
Information
Volume 10
Issue 9
Twisted Edwards curves have been at the center of attention since their introduction by Bernstein et al. in 2007. The curve ED25519, used for Edwards-curve Digital Signature Algorithm (EdDSA), provides faster digital signatures than existing schemes
Publikováno v:
Applied Sciences, Vol 9, Iss 1, p 64 (2018)
Applied Sciences
Volume 9
Issue 1
Applied Sciences
Volume 9
Issue 1
Security of embedded systems is the need of the hour. A mathematically secure algorithm runs on a cryptographic chip on these systems, but secret private data can be at risk due to side-channel leakage information. This research focuses on retrieving
Publikováno v:
ISSPIT
Biomedical image classification has always been a challenging and critical task which has the highest level of importance. The Deep Neural Network (DNN) has been recently introduced for normal image classification and lately introduced for Biomedical
Publikováno v:
BioMed Research International
BioMed Research International, Vol 2018 (2018)
BioMed Research International, Vol 2018 (2018)
Breast Cancer is a serious threat and one of the largest causes of death of women throughout the world. The identification of cancer largely depends on digital biomedical photography analysis such as histopathological images by doctors and physicians