An Approach to Enhancement in Security Using Elliptic Curve Cryptography over RSA Dileep (original) (raw)

Comparative Study on the Performance of Elliptic Curve Cryptography Algorithms with Cryptography through RSA Algorithm

Nelson SAHO

2020

View PDFchevron_right

An Attempt to Improve Data Security in Text Based Cryptosystem Using Elliptic Curve Cryptography

Aishvarya Akshaya Vishva Raman, International Journal IJRITCC

View PDFchevron_right

Data Security Using Elliptic Curve Cryptography

IJCERT Publications

View PDFchevron_right

An Enhanced Elliptic Curve Cryptosystem for Securing Data

Frimpong Twum

International Journal of Computer Applications, 2018

View PDFchevron_right

A Detailed Study of Elliptic Curve Cryptography Algorithm and Its Performance.

Ijesrt Journal

International Journal of Engineering Sciences & Research Technology, 2013

View PDFchevron_right

Analysis and Implementation of Combined Approach of RSA and ECC Algorithm for Enhanced Data Security

deepak chaudhary

International Journal of Computer Applications, 2015

View PDFchevron_right

Implementation of Text Encryption using Elliptic Curve Cryptography

Khumanthem Manglem Singh

Procedia Computer Science, 2015

View PDFchevron_right

Text Encryption with Improved Elliptic Curve Cryptography

Adeniji David

Journal of Advances in Mathematics and Computer Science

View PDFchevron_right

Applications of Elliptic Curve Cryptography

Yogita Pagar

2015

View PDFchevron_right

Prospective Utilization of Elliptic Curve Cryptography for Security: Authentication, Encryption and Decryption

IOSR Journals

View PDFchevron_right

EFFECTIVENESS OF ELLIPTIC CURVE CRYPTOGRAPHY

Ankur Bist

View PDFchevron_right

The Advantages of Elliptic Curve Cryptography for Security

vasu srungaram

Global journal of Pure and Applied Mathematics

View PDFchevron_right

Analysis of Elliptic Curve Cryptography & RSA

Mohammad Khan, mustafizul haque

Journal of ICT Standardization

View PDFchevron_right

A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY USING CHARACTER CONVERSION METHOD

iaeme iaeme

View PDFchevron_right

REVIEW OF CRYPTOGRAPHY WITH ECC ENCRYPTION SCHEME

IJEEE APM

View PDFchevron_right

Security Analysis of Elliptic Curve Cryptography and RSA

Dindayal Mahto

2016

View PDFchevron_right

Secure Tranmission of Data by Elliptic Curve Cryptography

Shally Gupta

International journal of engineering research and technology, 2018

View PDFchevron_right

ELLIPTIC CURVE BASED SECURE MESSAGING SYSTEM

Abdul-Rahman Mahmood

View PDFchevron_right

Image Encryption and Decryption Using Elliptic Curve Cryptography

Bhairvee Singh

2014

View PDFchevron_right

Elliptic Curve Cryptography-A new approach to Public Key Cryptography

Ijesrt Journal

View PDFchevron_right

IMAGE ENCRYPTION USING ELLIPTIC CURVE CRYPTOGRAPHY

MGES Journals

View PDFchevron_right

TECHNOLOGY Elliptic Curve Cryptography-A new approach to Public Key Cryptography

Ajit Karki

2016

View PDFchevron_right

A Comparative Study of RSA and ECC

IJERA Journal

View PDFchevron_right

An efficient Technique for Data Security using Improved Elliptic Curve Cryptosystem over Cloud Computing

International Journal of Scientific Research in Computer Science, Engineering and Information Technology IJSRCSEIT

International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2023

View PDFchevron_right

A Survey Report On Elliptic Curve Cryptography

samta gajbhiye

International Journal of Electrical and Computer Engineering (IJECE), 2011

View PDFchevron_right

Image encryption based on elliptic curve cryptosystem

International Journal of Electrical and Computer Engineering (IJECE)

International Journal of Electrical and Computer Engineering (IJECE), 2021

View PDFchevron_right

IJERT-An Implementation Of Elliptic Curve Cryptography

IJERT Journal

International Journal of Engineering Research and Technology (IJERT), 2013

View PDFchevron_right

On Elliptic Curves Cryptography Council for Innovative Research INTRODUCTION

Kazi Khan

2013

View PDFchevron_right

Improving Efficiency of Basic Encryption and Authentication Technique using Elliptic Curve with Parameterized Hash Algorithm

Usha Chouhan

International Journal of Computer Applications, 2013

View PDFchevron_right

Implementation and Secured Authentication Key using Elliptic Curve Cryptography

IJIRIS Journal Division

View PDFchevron_right

Implementation of Elliptic Curve Cryptography for Audio Based Application

Vinit Gunjan

IJERT, 2014

View PDFchevron_right

Elliptic Curve Cryptography using Authenticated Encryption

IJERA Journal

View PDFchevron_right

A Client Server Crypto System Based on Elliptic Curve Cryptography and Mapping Technique

International Journal of Scientific Research in Science, Engineering and Technology IJSRSET

International Journal of Scientific Research in Science, Engineering and Technology, 2021

View PDFchevron_right

Efficiency of 128-bit Encryption and Decryption Process on Elgamal Method Using Elliptic Curve Cryptography (ECC)

Afzalur Syaref

TELKOMNIKA (Telecommunication Computing Electronics and Control)

View PDFchevron_right

The comparison of several cryptosystems using the elliptic curve: a report

International Journal of Electrical and Computer Engineering (IJECE)

International Journal of Electrical and Computer Engineering (IJECE), 2024

View PDFchevron_right