A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
MARITIME CRYPTOLOGY
2017
Pattimura Proceeding: Conference of Science and Technology
They independently introduced the elliptic curve to design a public-key cryptography. ...
Elliptic Curve Cryptography (ECC) was first introduced by Neal Koblitz and Victor Miller ([Koblitz1987],[Miller1985]). ...
They independently introduced the elliptic curve to design a public-key cryptography. ...
doi:10.30598/pattimurasci.2017.icbs3.001-004
fatcat:a4sbe5hy5jhjvgkagbpm5ypyou
Elliptic Curve Diffie-Hellman (ECDH) Analogy for Secured Wireless Sensor Networks
2020
International Journal of Computer Applications
The algorithm for Elliptic Curve Diffie Hellman key exchange is studied and analyzed using PyCryptodome package and the Elliptic Curve Integrated Encryption Scheme. ...
Due to such circumstances, it is important to recognise the need for a holistic and robust security to ensure WSNs are well established and protected. ...
In this study, the application of elliptic curves in cryptography for the construction of public and secret keys is carried out. ...
doi:10.5120/ijca2020920015
fatcat:3h4jh6p2bvcwblpi4ko6c6fcge
Low Power FPGA Based Elliptical Curve Cryptography
2013
IOSR Journal of Electronics and Communication Engineering
The principal attraction of elliptic curve cryptography compared to RSA is that it offers equal security for a smaller key-size, thereby reducing the processing overhead. ...
Cryptography is the study of techniques for ensuring the secrecy and authentication of the information. ...
The study of elliptic curves by algebraists, algebraic geometers and number theorists dates back to the middle of the nineteenth century. ...
doi:10.9790/2834-0621114
fatcat:wbk3hflacjd3dlhrvs77l2deme
An Approach for Security of Images over Elliptical Curve Cryptography and Digital Signature
2016
International Journal of Computer Applications
The most popular asymmetric cryptography techniques are RSA (Rivest-Shamir-Adleman) and ECC (Elliptic Curve Cryptography). ...
RSA is based on Factorization Problem and ECC is based on Elliptic Curve arithmetic and Discrete Logarithm Problem. ...
Elliptical curve cryptography was introduced by Neal Koblitz and Victor S. Miller [1] . It makes use of the structure of elliptical curves over finite fields. ...
doi:10.5120/ijca2016912203
fatcat:uzcmuv6buzaifblhpdcz6sj4zi
Analytical Study of Implementation Issues of Elliptical Curve Cryptography for Wireless Sensor networks
2010
2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops
Elliptical curve cryptography is a complex computational model and before its implementation for wireless sensor network platform, several parameters have to be carefully selected. ...
The paper concludes with a critique of inadequacies and how the current research attempts to address some of them with a summary of some early results from the research. ...
This paper has provided a brief view into the complex topic of elliptic curve cryptography. ...
doi:10.1109/waina.2010.47
dblp:conf/aina/ShahHS10a
fatcat:q7yprnugdfaankhr323gvxtwte
Security Enhancement in Android using Ellipic Curve Cryptography
2017
International Journal of Security and Its Applications
However, Elliptic Curve Cryptography has been considered as a viable cryptographic technique due to its low computational overhead. ...
In this paper we study the application of ECC on a popular Android operating system. Practical implementation of the ECC operations has been performed using Android library. ...
Elliptic Curve Cryptography Elliptic Curve Cryptography (ECC) is a public key cryptography. ...
doi:10.14257/ijsia.2017.11.6.03
fatcat:d4idgrwrvzgf3istyufee2fi6a
An empirical study to demonstrate that EdDSA can be used as a performance improvement alternative to ECDSA in Blockchain and IoT
2022
Informatica (Ljubljana, Tiskana izd.)
A digital signature scheme (DSS) is used to generate signatures. This paper investigates the widely used elliptic curve digital signature algorithm (ECDSA) and its application to blockchain and IoT. ...
Digital signatures are a vital part of the digital world. The trust factor in the digital world is ensured with a digital signature. ...
Application of elliptic curve cryptography in blockchain In this sub-section research works on various applications of Elliptic curve cryptography in blockchain are reviewed and presented. [22] proposed ...
doi:10.31449/inf.v46i2.3807
fatcat:dbn2dwzxkrbavg2c6d5oql7mqe
Page 9626 of Mathematical Reviews Vol. , Issue 2004m
[page]
2004
Mathematical Reviews
Elliptic curve cryptography is a fast moving subject and, since the workshop took place in 2000, there has been tremendous interest in applications of the Weil and Tate pairings. ...
These questions have received significant attention due to the application of elliptic curves in public key cryptography. ...
A Study on Pairing Functions for Cryptography
2016
International Journal of Computer Applications
In these situations variety of security mechanisms are needed to overcome security attacks. The range of security is based on diffusion of data and confusion. ...
In this paper different types of pairing functions are discussed that has a unique nature of handling real numbers while processing. ...
This property of elliptic curve cryptography made it extremely attractive in the area of cryptography. ...
doi:10.5120/ijca2016911585
fatcat:uqvg5chikrd6jd3mvsm5vbic2u
Report on Pairing-based Cryptography
2015
Journal of Research of the National Institute of Standards and Technology
Besides IBE, there are a number of other applications of pairing-based cryptography. ...
It explores different application scenarios for pairing-based cryptography schemes. ...
Introduction Recently, pairings on elliptic curves have been a very active area of research in cryptography. ...
doi:10.6028/jres.120.002
pmid:26958435
pmcid:PMC4730686
fatcat:zxzb76skivd5zhfg5hmiohichq
IMPLEMENTASI KRIPTOGRAFI DENGAN METODE ELLIPTIC CURVE CRYPTOGRAPHY (ECC) UNTUK APLIKASI CHATTING DALAM CLOUD COMPUTING BERBASIS ANDROID
2020
KERNEL: Jurnal Riset Inovasi Bidang Informatika dan Pendidikan Informatika
From the above test it can be concluded that the Elliptic Curve Cryptography (ECC) algorithmmethod is effective for hiding data files in chat applications that are privacy.Keywords: Cryptography, Elliptic ...
, Algoritma Elliptic Curve Cryptography (ECC), Avalanche Effect ...
Yaitu bagaimana mengimplementasikan cryptography dengan metode Elliptic Curve Cryptography (ECC) untuk aplikasi chatting berbasis android dan bagaimana performa komputasi metode algoritma Elliptic Curve ...
doi:10.31284/j.kernel.2020.v1i1.929
fatcat:2f5jl3pvm5f3fg7w6ifut2bdyy
A workload characterization of elliptic curve cryptography methods in embedded environments
2003
Proceedings of the 2003 workshop on MEmory performance DEaling with Applications , systems and architecture - MEDEA '03
level as the standard methods We have developed a set of benchmarks to compare standard and corresponding elliptic curve public-key methods. ...
Elliptic Curve Cryptography (ECC) is emerging as an attractive public-key system for constrained environments, because of the small key sizes and computational efficiency, while preserving the same security ...
The use of elliptic curve cryptography also involves choosing a finite field, a specific curve on it, and a base point on the chosen curve. ...
doi:10.1145/1152923.1024299
fatcat:gakqbd6x4rc3npomakanuej5t4
Image Security using ECC Approach
2015
Indian Journal of Science and Technology
As a result Elliptic Curve Cryptography for image data is developed to meet the current security needs. Application: To transmit securely image data over the wireless channels and systems and so on. ...
from the elliptic Curve. ...
Elliptic_Curves Elliptic curves are algebraic curves which have been studied by many mathematicians for a long time. ...
doi:10.17485/ijst/2015/v8i26/81185
fatcat:rkvtwjqfczg2fd2rfycfub5cn4
A workload characterization of elliptic curve cryptography methods in embedded environments
2004
SIGARCH Computer Architecture News
level as the standard methods We have developed a set of benchmarks to compare standard and corresponding elliptic curve public-key methods. ...
Elliptic Curve Cryptography (ECC) is emerging as an attractive public-key system for constrained environments, because of the small key sizes and computational efficiency, while preserving the same security ...
The use of elliptic curve cryptography also involves choosing a finite field, a specific curve on it, and a base point on the chosen curve. ...
doi:10.1145/1024295.1024299
fatcat:pc6zcdw5cngohibkugzhf5q5gu
ELLIPTIC CURVE CRYPTOGRAPHY
2014
Science-based technologies
In this article the structure of elliptic cryptography,its shape and main points of application is reviewed.We examined advantages of using ECC comparing with RSA and others. ...
Thoughts that Elliptic curves will be successful as to their key length, less demanding performance, security. ...
The Aim The aim of this article is to systematize information on the practical application of elliptic curves,its general terms, compare RSA and ECC, affect the topic of ECC popularity. ...
doi:10.18372/2310-5461.22.6815
fatcat:vm5okeziqjct5movcj4wrabynu
« Previous
Showing results 1 — 15 out of 9,756 results