2023
DOI: 10.1016/j.cosrev.2022.100530
|View full text |Cite
|
Sign up to set email alerts
|

Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
48
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 77 publications
(48 citation statements)
references
References 61 publications
0
48
0
Order By: Relevance
“…Cryptography is necessary as data transmission is vulnerable to data attack and theft in an open channel. Adoption of EC methods have produced significant advantages in interdependent networking and distributed computing 27 . In data trading, the existing study has used Attribute‐based encryption method based on DBDH to safeguard the data trading network.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Cryptography is necessary as data transmission is vulnerable to data attack and theft in an open channel. Adoption of EC methods have produced significant advantages in interdependent networking and distributed computing 27 . In data trading, the existing study has used Attribute‐based encryption method based on DBDH to safeguard the data trading network.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Cryptography is widely used in various applications, including online banking, e-commerce, secure communication between individuals and organizations, and in the protection of critical infrastructure systems [5], [6]. Without cryptography, sensitive information would be vulnerable to cyber-attacks and malicious activities, leading to severe consequences such as data breaches, identity theft, and financial loss [7], [8]. Therefore, cryptography is essential for ensuring the confidentiality, integrity, and availability of data and maintaining trust in the digital world [9], [7].…”
Section: Introductionmentioning
confidence: 99%
“…Without cryptography, sensitive information would be vulnerable to cyber-attacks and malicious activities, leading to severe consequences such as data breaches, identity theft, and financial loss [7], [8]. Therefore, cryptography is essential for ensuring the confidentiality, integrity, and availability of data and maintaining trust in the digital world [9], [7]. On the other hand, field-programmable gate arrays (FPGAs) are increasingly being utilized in edge computing environments due to their versatility, configurability, and performance advantages [10], [11].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Several software and hardware solutions have been proposed and implemented in the industry to increase the resiliency of the SCADA system to cyberattacks. One of them is zero-trust network architecture [27] with software-based approaches, such as the Elliptic Curve Digital Signature Algorithm (ECDSA) [28]. Hardware-based solutions have also been proposed, including using a Trusted Platform Module (TPM) to create a trusted chain for IoT devices and enhance the security of SCADA and automation systems [29,30].…”
mentioning
confidence: 99%