Filters








9,756 Hits in 4.8 sec

MARITIME CRYPTOLOGY

Intan Muchtadi Alamsyah
2017 Pattimura Proceeding: Conference of Science and Technology  
They independently introduced the elliptic curve to design a public-key cryptography.  ...  Elliptic Curve Cryptography (ECC) was first introduced by Neal Koblitz and Victor Miller ([Koblitz1987],[Miller1985]).  ...  They independently introduced the elliptic curve to design a public-key cryptography.  ... 
doi:10.30598/pattimurasci.2017.icbs3.001-004 fatcat:a4sbe5hy5jhjvgkagbpm5ypyou

Elliptic Curve Diffie-Hellman (ECDH) Analogy for Secured Wireless Sensor Networks

Stephen Aikins-Bekoe, James Ben
2020 International Journal of Computer Applications  
The algorithm for Elliptic Curve Diffie Hellman key exchange is studied and analyzed using PyCryptodome package and the Elliptic Curve Integrated Encryption Scheme.  ...  Due to such circumstances, it is important to recognise the need for a holistic and robust security to ensure WSNs are well established and protected.  ...  In this study, the application of elliptic curves in cryptography for the construction of public and secret keys is carried out.  ... 
doi:10.5120/ijca2020920015 fatcat:3h4jh6p2bvcwblpi4ko6c6fcge

Low Power FPGA Based Elliptical Curve Cryptography

Ajay S Ajay S
2013 IOSR Journal of Electronics and Communication Engineering  
The principal attraction of elliptic curve cryptography compared to RSA is that it offers equal security for a smaller key-size, thereby reducing the processing overhead.  ...  Cryptography is the study of techniques for ensuring the secrecy and authentication of the information.  ...  The study of elliptic curves by algebraists, algebraic geometers and number theorists dates back to the middle of the nineteenth century.  ... 
doi:10.9790/2834-0621114 fatcat:wbk3hflacjd3dlhrvs77l2deme

An Approach for Security of Images over Elliptical Curve Cryptography and Digital Signature

Toradmalle Dhanashree, Sonigara Varsha, Singh Kiran, Kakade Omkar, Panigrahy Krishnachandra
2016 International Journal of Computer Applications  
The most popular asymmetric cryptography techniques are RSA (Rivest-Shamir-Adleman) and ECC (Elliptic Curve Cryptography).  ...  RSA is based on Factorization Problem and ECC is based on Elliptic Curve arithmetic and Discrete Logarithm Problem.  ...  Elliptical curve cryptography was introduced by Neal Koblitz and Victor S. Miller [1] . It makes use of the structure of elliptical curves over finite fields.  ... 
doi:10.5120/ijca2016912203 fatcat:uzcmuv6buzaifblhpdcz6sj4zi

Analytical Study of Implementation Issues of Elliptical Curve Cryptography for Wireless Sensor networks

Pritam Gajkumar Shah, Xu Huang, Dharmendra Sharma
2010 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops  
Elliptical curve cryptography is a complex computational model and before its implementation for wireless sensor network platform, several parameters have to be carefully selected.  ...  The paper concludes with a critique of inadequacies and how the current research attempts to address some of them with a summary of some early results from the research.  ...  This paper has provided a brief view into the complex topic of elliptic curve cryptography.  ... 
doi:10.1109/waina.2010.47 dblp:conf/aina/ShahHS10a fatcat:q7yprnugdfaankhr323gvxtwte

Security Enhancement in Android using Ellipic Curve Cryptography

Muneer Ahmad Dar, Javed Parvez
2017 International Journal of Security and Its Applications  
However, Elliptic Curve Cryptography has been considered as a viable cryptographic technique due to its low computational overhead.  ...  In this paper we study the application of ECC on a popular Android operating system. Practical implementation of the ECC operations has been performed using Android library.  ...  Elliptic Curve Cryptography Elliptic Curve Cryptography (ECC) is a public key cryptography.  ... 
doi:10.14257/ijsia.2017.11.6.03 fatcat:d4idgrwrvzgf3istyufee2fi6a

An empirical study to demonstrate that EdDSA can be used as a performance improvement alternative to ECDSA in Blockchain and IoT

Guruprakash J, Srinivas Koppu
2022 Informatica (Ljubljana, Tiskana izd.)  
A digital signature scheme (DSS) is used to generate signatures. This paper investigates the widely used elliptic curve digital signature algorithm (ECDSA) and its application to blockchain and IoT.  ...  Digital signatures are a vital part of the digital world. The trust factor in the digital world is ensured with a digital signature.  ...  Application of elliptic curve cryptography in blockchain In this sub-section research works on various applications of Elliptic curve cryptography in blockchain are reviewed and presented. [22] proposed  ... 
doi:10.31449/inf.v46i2.3807 fatcat:dbn2dwzxkrbavg2c6d5oql7mqe

Page 9626 of Mathematical Reviews Vol. , Issue 2004m [page]

2004 Mathematical Reviews  
Elliptic curve cryptography is a fast moving subject and, since the workshop took place in 2000, there has been tremendous interest in applications of the Weil and Tate pairings.  ...  These questions have received significant attention due to the application of elliptic curves in public key cryptography.  ... 

A Study on Pairing Functions for Cryptography

B. Reddaiah
2016 International Journal of Computer Applications  
In these situations variety of security mechanisms are needed to overcome security attacks. The range of security is based on diffusion of data and confusion.  ...  In this paper different types of pairing functions are discussed that has a unique nature of handling real numbers while processing.  ...  This property of elliptic curve cryptography made it extremely attractive in the area of cryptography.  ... 
doi:10.5120/ijca2016911585 fatcat:uqvg5chikrd6jd3mvsm5vbic2u

Report on Pairing-based Cryptography

Dustin Moody, Rene Peralta, Ray Perlner, Andrew Regenscheid, Allen Roginsky, Lily Chen
2015 Journal of Research of the National Institute of Standards and Technology  
Besides IBE, there are a number of other applications of pairing-based cryptography.  ...  It explores different application scenarios for pairing-based cryptography schemes.  ...  Introduction Recently, pairings on elliptic curves have been a very active area of research in cryptography.  ... 
doi:10.6028/jres.120.002 pmid:26958435 pmcid:PMC4730686 fatcat:zxzb76skivd5zhfg5hmiohichq

IMPLEMENTASI KRIPTOGRAFI DENGAN METODE ELLIPTIC CURVE CRYPTOGRAPHY (ECC) UNTUK APLIKASI CHATTING DALAM CLOUD COMPUTING BERBASIS ANDROID

Ainur Rilo Taqwa, Danang Haryo Sulaksono
2020 KERNEL: Jurnal Riset Inovasi Bidang Informatika dan Pendidikan Informatika  
From the above test it can be concluded that the Elliptic Curve Cryptography (ECC) algorithmmethod is effective for hiding data files in chat applications that are privacy.Keywords: Cryptography, Elliptic  ...  , Algoritma Elliptic Curve Cryptography (ECC), Avalanche Effect  ...  Yaitu bagaimana mengimplementasikan cryptography dengan metode Elliptic Curve Cryptography (ECC) untuk aplikasi chatting berbasis android dan bagaimana performa komputasi metode algoritma Elliptic Curve  ... 
doi:10.31284/j.kernel.2020.v1i1.929 fatcat:2f5jl3pvm5f3fg7w6ifut2bdyy

A workload characterization of elliptic curve cryptography methods in embedded environments

I. Branovic, R. Giorgi, E. Martinelli
2003 Proceedings of the 2003 workshop on MEmory performance DEaling with Applications , systems and architecture - MEDEA '03  
level as the standard methods We have developed a set of benchmarks to compare standard and corresponding elliptic curve public-key methods.  ...  Elliptic Curve Cryptography (ECC) is emerging as an attractive public-key system for constrained environments, because of the small key sizes and computational efficiency, while preserving the same security  ...  The use of elliptic curve cryptography also involves choosing a finite field, a specific curve on it, and a base point on the chosen curve.  ... 
doi:10.1145/1152923.1024299 fatcat:gakqbd6x4rc3npomakanuej5t4

Image Security using ECC Approach

Srinivasan Nagaraj, G. S. V. P. Raju
2015 Indian Journal of Science and Technology  
As a result Elliptic Curve Cryptography for image data is developed to meet the current security needs. Application: To transmit securely image data over the wireless channels and systems and so on.  ...  from the elliptic Curve.  ...  Elliptic_Curves Elliptic curves are algebraic curves which have been studied by many mathematicians for a long time.  ... 
doi:10.17485/ijst/2015/v8i26/81185 fatcat:rkvtwjqfczg2fd2rfycfub5cn4

A workload characterization of elliptic curve cryptography methods in embedded environments

I. Branovic, R. Giorgi, E. Martinelli
2004 SIGARCH Computer Architecture News  
level as the standard methods We have developed a set of benchmarks to compare standard and corresponding elliptic curve public-key methods.  ...  Elliptic Curve Cryptography (ECC) is emerging as an attractive public-key system for constrained environments, because of the small key sizes and computational efficiency, while preserving the same security  ...  The use of elliptic curve cryptography also involves choosing a finite field, a specific curve on it, and a base point on the chosen curve.  ... 
doi:10.1145/1024295.1024299 fatcat:pc6zcdw5cngohibkugzhf5q5gu

ELLIPTIC CURVE CRYPTOGRAPHY

O. O. Meleshko, O. O. Kovalskiy
2014 Science-based technologies  
In this article the structure of elliptic cryptography,its shape and main points of application is reviewed.We examined advantages of using ECC comparing with RSA and others.  ...  Thoughts that Elliptic curves will be successful as to their key length, less demanding performance, security.  ...  The Aim The aim of this article is to systematize information on the practical application of elliptic curves,its general terms, compare RSA and ECC, affect the topic of ECC popularity.  ... 
doi:10.18372/2310-5461.22.6815 fatcat:vm5okeziqjct5movcj4wrabynu
« Previous Showing results 1 — 15 out of 9,756 results