Finite field multiplication combining AMNS and DFT approach for pairing cryptography
FREE-DOWNLOAD N El Mrabet… – Information Security and Privacy, 2009 Abstract. Pairings over elliptic curves use fields Fpk with p = 2160 and 6 < k = 32. In this paper we propose to represent elements in Fp with AMNS sytem of [1]. For well chosen AMNS we get roots of unity with sparse representation. […]
blind source separation based cryptography scheme for mobile military communication applications
FREE-DOWNLOAD N Doukas… – WSEAS TRANSACTIONS on …, 2008 Security in digital transmission is an increasingly interesting topic in a number of fields. In many cases however, the need for security is forfeited due to the high complexity of commonly used cryptosystems. The use of the underdetermined source separation problem as a basis for .
Secure localization using Elliptic Curve Cryptography in wireless sensor networks
FREE-DOWNLOAD V Vijayalakshmi… – IJCSNS, 2008 Summary The crucial problem in Wireless Sensor Networks (WSNs) is position estimation or Localization, due to their dynamic method of deployment. There are several methods in determining their physical locations but the greatest challenge imposed is in communicating with their