2016
DOI: 10.1109/tdsc.2016.2577022
|View full text |Cite
|
Sign up to set email alerts
|

On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
47
0
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 74 publications
(48 citation statements)
references
References 31 publications
0
47
0
1
Order By: Relevance
“…The linear relation between the time consumption and the input of the proposed schemes proves that DNA mapping before encryption and DNA remapping after decryption do not require complex quadratic computations. The energy consumption of the proposed scheme is slightly higher when compared to some of the existing designs owing to DNA mapping and remapping in the proposed scheme. However, despite an increase in energy consumption, the proposed scheme significantly increases the resilience of the elliptical cryptosystem.…”
Section: Simulation and Implementation Resultsmentioning
confidence: 91%
See 3 more Smart Citations
“…The linear relation between the time consumption and the input of the proposed schemes proves that DNA mapping before encryption and DNA remapping after decryption do not require complex quadratic computations. The energy consumption of the proposed scheme is slightly higher when compared to some of the existing designs owing to DNA mapping and remapping in the proposed scheme. However, despite an increase in energy consumption, the proposed scheme significantly increases the resilience of the elliptical cryptosystem.…”
Section: Simulation and Implementation Resultsmentioning
confidence: 91%
“… A: Input data length; B: Normalized input data length; C: Total execution time (DNA remapping + Decryption); D: CPU clock cycles; E: Core current; F: Core energy; G: Energy consumption reported in existing work . …”
Section: Simulation and Implementation Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…However, it is infeasible to apply cryptography-based techniques in IoT due to the constraints of the energy and computational capability of smart objects [238], [239]. Therefore, new lightweight protection schemes are expected to be developed for IoT [240]. • Privacy and security in data storage.…”
Section: Security and Privacy Concernsmentioning
confidence: 99%