The Advantages of Elliptic Curve Cryptography for Security (original) (raw)

Applications of Elliptic Curve Cryptography

Yogita Pagar

2015

View PDFchevron_right

A Survey Report On Elliptic Curve Cryptography

samta gajbhiye

International Journal of Electrical and Computer Engineering (IJECE), 2011

View PDFchevron_right

Application of Elliptic Curves Cryptography In Wireless Communications Security

Mohammad Ghamgosar

JOURNAL OF APPLIED …, 2006

View PDFchevron_right

Prospective Utilization of Elliptic Curve Cryptography for Security: Authentication, Encryption and Decryption

IOSR Journals

View PDFchevron_right

Elliptic Curve Cryptography using Authenticated Encryption

IJERA Journal

View PDFchevron_right

The comparison of several cryptosystems using the elliptic curve: a report

International Journal of Electrical and Computer Engineering (IJECE)

International Journal of Electrical and Computer Engineering (IJECE), 2024

View PDFchevron_right

IJERT-An Implementation Of Elliptic Curve Cryptography

IJERT Journal

International Journal of Engineering Research and Technology (IJERT), 2013

View PDFchevron_right

An Enhanced Elliptic Curve Cryptosystem for Securing Data

Frimpong Twum

International Journal of Computer Applications, 2018

View PDFchevron_right

On Assurance of Information Security using Elliptic Curves Cryptosystems

Ion Tutanescu

Journal of Internet Technology and Secured Transaction, 2012

View PDFchevron_right

EFFECTIVENESS OF ELLIPTIC CURVE CRYPTOGRAPHY

Ankur Bist

View PDFchevron_right

A Detailed Study of Elliptic Curve Cryptography Algorithm and Its Performance.

Ijesrt Journal

International Journal of Engineering Sciences & Research Technology, 2013

View PDFchevron_right

Guide to Elliptic Curve Cryptography

Isromi Janwar

View PDFchevron_right

Elliptic Curves as Tool for Public Key Cryptography

researchinventy researchinventy

View PDFchevron_right

Elliptic Curve Cryptography-A new approach to Public Key Cryptography

Ijesrt Journal

View PDFchevron_right

ELLIPTIC CURVE BASED SECURE MESSAGING SYSTEM

Abdul-Rahman Mahmood

View PDFchevron_right

Elliptic Curve Cryptography and Its Applications to Mobile Devices

Anh Tuan Vo

View PDFchevron_right

Elliptic Curve Cryptography in Cloud Security: A Survey

Raza Imam

2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence), 2022

View PDFchevron_right

Elliptic Curves and Cryptography

Aleksandar Jurisic

Undergraduate Texts in Mathematics, 2014

View PDFchevron_right

Comparative Study on the Performance of Elliptic Curve Cryptography Algorithms with Cryptography through RSA Algorithm

Nelson SAHO

2020

View PDFchevron_right

On Elliptic Curves Cryptography Council for Innovative Research INTRODUCTION

Kazi Khan

2013

View PDFchevron_right

A survey of the elliptic curve integrated encryption scheme

Carmen Sánchez Ávila

View PDFchevron_right

Elliptic Curves and their use in Cryptography

Victor Miller

1997

View PDFchevron_right

Achieving Authentication and Integrity using Elliptic Curve Cryptography Architecture

Aaradhana Deshmukh

International Journal of Computer Applications, 2013

View PDFchevron_right

A Novel And Efficient Algorithm To Enhance The Complexity Of Elliptic Curve Cryptography

Akshay Atrey

2009

View PDFchevron_right

Security through Elliptic Curve Cryptography in UID for Fetching Relevant Information Only

Aman Verma

International Journal for Research in Applied Science and Engineering Technology, 2018

View PDFchevron_right

Elliptic Curve Cryptography Engineering

Usha Vyas

Proceedings of the …, 2006

View PDFchevron_right

Secure Transmission of Information Using Key Management by Elliptic-Curve Cryptography

IJIREM JOURNAL

View PDFchevron_right

Elliptic Curve Cryptography and Security Protocol

vasu srungaram

GIS SCIENCE

View PDFchevron_right

Analysis of Elliptic Curve Cryptography & RSA

Mohammad Khan, mustafizul haque

Journal of ICT Standardization

View PDFchevron_right

Security and Practical Considerations When Implementing the Elliptic Curve Integrated Encryption Scheme

Hernández Encinas, Queiruga Dios

Cryptologia, 2015

View PDFchevron_right

Implementation and Secured Authentication Key using Elliptic Curve Cryptography

IJIRIS Journal Division

View PDFchevron_right

The University of Adelaide Elliptic Curve Cryptography

Raja Ghosal

2006

View PDFchevron_right