Prospective Utilization of Elliptic Curve Cryptography for Security: Authentication, Encryption and Decryption (original) (raw)
Related papers
Security Analysis of Elliptic Curve Cryptography and RSA
2016
Analysis of Elliptic Curve Cryptography & RSA
Mohammad Khan, mustafizul haque
Journal of ICT Standardization
An Enhanced Elliptic Curve Cryptosystem for Securing Data
International Journal of Computer Applications, 2018
A Detailed Study of Elliptic Curve Cryptography Algorithm and Its Performance.
International Journal of Engineering Sciences & Research Technology, 2013
A Review on Elliptic Curve Cryptography for Embedded Systems
arXiv preprint arXiv:1107.3631, 2011
2020
IJERT-An Implementation Of Elliptic Curve Cryptography
International Journal of Engineering Research and Technology (IJERT), 2013
Elliptic Curves as Tool for Public Key Cryptography
researchinventy researchinventy
Applications of Elliptic Curve Cryptography
2015
Elliptic Curve Cryptography-A new approach to Public Key Cryptography
A Novel And Efficient Algorithm To Enhance The Complexity Of Elliptic Curve Cryptography
2009
An Approach to Enhancement in Security Using Elliptic Curve Cryptography over RSA Dileep
2015
Performance Analysis of RSA and Elliptic Curve Cryptography
2018
ELLIPTIC CURVE ALGORITHM USAGE IN WIRELESS SECURITY WITH PUBLIC KEY CRYPTOGRAPHY
Elliptic Curve Cryptography using Authenticated Encryption
A Survey Report On Elliptic Curve Cryptography
International Journal of Electrical and Computer Engineering (IJECE), 2011
Implementation and Secured Authentication Key using Elliptic Curve Cryptography
Elliptic Curve Cryptography and Security Protocol
GIS SCIENCE
International Journal of Computer Applications, 2013
The Advantages of Elliptic Curve Cryptography for Security
Global journal of Pure and Applied Mathematics
On Assurance of Information Security using Elliptic Curves Cryptosystems
Journal of Internet Technology and Secured Transaction, 2012
Authenticated Public Key Encryption Scheme Using Elliptic Curve Cryptography
Zenodo (CERN European Organization for Nuclear Research), 2022
V International Enformatika …, 2005
A Comparative Study of RSA and ECC
IMPLEMENTATION OF ELLIPTIC - CURVE CRYPTOGRAPHY
IAEME Publication, 2020
Elliptic Curves and Cryptography
1999
Elliptic Curve Cryptography for the Security of Insecure Internet of Things
2022 International Conference on Future Trends in Smart Communities (ICFTSC), 2023
The comparison of several cryptosystems using the elliptic curve: a report
International Journal of Electrical and Computer Engineering (IJECE)
International Journal of Electrical and Computer Engineering (IJECE), 2024
ELLIPTIC CURVE BASED SECURE MESSAGING SYSTEM
An implementation of ElGamal elliptic curves cryptosystems
Circuits and Systems, 1998. …, 1999
Development of a New Elliptic Curve Cryptosystem with Factoring Problem
American Journal of Applied Sciences, 2012