Results 11 to 20 of about 7,729 (216)

Lightweight and Secure Elliptical Curve Cryptography (ECC) Key Exchange for Mobile Phones

open access: goldInternational Journal of Interactive Mobile Technologies (iJIM), 2021
Open networks enable data communication between different types of mobile devices that showcase the need to enforce elevated security measures. Securing sensitive or confidential data in mobile phones is accomplished by implementing a diverse range of cryptographic techniques.
Muneer Ahmad Dar   +3 more
openalex   +4 more sources

The Overview of Elliptic Curve Cryptography (ECC) [PDF]

open access: goldJournal of Physics: Conference Series, 2022
Abstract Elliptic Curve Cryptography (ECC) is one of the strongest and most efficient cryptographic techniques in modern cryptography. This paper gives the following introduction: The introduction of cryptography’s development; the introduction of the elliptic curve; the principle of ECC; the horizontal comparison between ECC and other ...
Yuhan Yan
openalex   +2 more sources

Elliptic Curve Cryptography (ECC) for Host Identity Protocol (HIP) [PDF]

open access: green2010 Ninth International Conference on Networks, 2010
We compare computational resources required for handling control plane of the Host Identity Protocol (HIP) using Rivest-Shamir-Adleman (RSA) versus Elliptic Curve Cryptography (ECC) encryption algorithms with keys of equivalent strength. We show that servers would establish almost three times more HIP connections per second when ECC is used for ...
Oleg Ponomarev   +2 more
  +5 more sources

MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks [PDF]

open access: bronze, 2014
Wireless Sensor Networks (WSNs) are susceptible to a wide range of malicious attacks, which has stimulated a body of research on “light-weight” security protocols and cryptographic primitives that are suitable for resource-restricted sensor nodes. In this paper we introduce MoTE-ECC, a highly optimized yet scalable ECC library for Memsic’s MICAz motes ...
Zhe Liu   +2 more
openalex   +4 more sources

Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Using Elliptic Curve Cryptography (ECC) [PDF]

open access: hybridTELKOMNIKA (Telecommunication Computing Electronics and Control), 2018
Cryptography is a growing science of data security. The integrity of a data is an important thing to keep the secrets contained in the data. In this research will be visualized the efficient quantities that use elliptic curves and do not use them. The Elgamal method is an asymmetric cryptographic algorithm whose complexity of processes.
Dicky Nofriansyah   +4 more
openalex   +5 more sources

ECC: Elliptic Curve Cryptography-based Watchdog for Detecting Malicious Nodes

open access: hybridThe SIJ Transactions on Computer Networks & Communication Engineering, 2017
M Rudhra   +4 more
openalex   +2 more sources

Text Encryption in Android Chat Applications using Elliptical Curve Cryptography (ECC)

open access: goldProcedia Computer Science, 2018
Abstract Information technology is an important aspect of human life that has provided comfort and ease in communicating. The most used communication technologies today is the smartphone, which is a mobile phone with the ability of a portable computer.
Dimas Natanael   +2 more
openalex   +3 more sources

An Adaptive Approach for image adaptive watermarking using Elliptical curve cryptography (ECC) [PDF]

open access: diamondAnnals of Computer Science and Information Systems, 2018
Naveen Kumar   +2 more
openalex   +3 more sources

Conditional Privacy-Preserving Authentication Scheme Without Using Point Multiplication Operations Based on Elliptic Curve Cryptography (ECC) [PDF]

open access: goldIEEE Access, 2020
Existing conditional privacy-preserving authentication schemes utilized in Vehicular Ad-hoc Networks (VANETs) to satisfy security and privacy requirements essentially depend on point multiplication operations. Achieving repaid verification method of the message is commonly suffer performance efficiency from resulting overheads. We propose a conditional
Jalawi Sulaiman Alshudukhi   +2 more
openalex   +4 more sources

Home - About - Disclaimer - Privacy