A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Achieving Authentication and Integrity using Elliptic Curve Cryptography Architecture
2013
International Journal of Computer Applications
Communication security is one of the areas where research is highly required. The data used in communication is very sensitive and needs to be protected and made abstract from intruders of system. This research is all about securing the messages or data that is being communicated among two parties.The recent branch of Network security is Cryptography using Elliptic Curve Architectures which is based on the arithmetic of elliptic curves and discrete logarithmic problems. ECC schemes are
doi:10.5120/12118-8141
fatcat:v3zgkz6h6fbejpma6am5m5ucku