Lightweight and Secure Elliptical Curve Cryptography (ECC) Key Exchange for Mobile Phones
Open networks enable data communication between different types of mobile devices that showcase the need to enforce elevated security measures. Securing sensitive or confidential data in mobile phones is accomplished by implementing a diverse range of cryptographic techniques.
Muneer Ahmad Dar+3 more
openalex +4 more sources
The Overview of Elliptic Curve Cryptography (ECC) [PDF]
Abstract Elliptic Curve Cryptography (ECC) is one of the strongest and most efficient cryptographic techniques in modern cryptography. This paper gives the following introduction: The introduction of cryptography’s development; the introduction of the elliptic curve; the principle of ECC; the horizontal comparison between ECC and other ...
Yuhan Yan
openalex +2 more sources
Elliptic Curve Cryptography (ECC) for Host Identity Protocol (HIP) [PDF]
We compare computational resources required for handling control plane of the Host Identity Protocol (HIP) using Rivest-Shamir-Adleman (RSA) versus Elliptic Curve Cryptography (ECC) encryption algorithms with keys of equivalent strength. We show that servers would establish almost three times more HIP connections per second when ECC is used for ...
Oleg Ponomarev+2 more
+5 more sources
MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks [PDF]
Wireless Sensor Networks (WSNs) are susceptible to a wide range of malicious attacks, which has stimulated a body of research on “light-weight” security protocols and cryptographic primitives that are suitable for resource-restricted sensor nodes. In this paper we introduce MoTE-ECC, a highly optimized yet scalable ECC library for Memsic’s MICAz motes ...
Zhe Liu+2 more
openalex +4 more sources
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Using Elliptic Curve Cryptography (ECC) [PDF]
Cryptography is a growing science of data security. The integrity of a data is an important thing to keep the secrets contained in the data. In this research will be visualized the efficient quantities that use elliptic curves and do not use them. The Elgamal method is an asymmetric cryptographic algorithm whose complexity of processes.
Dicky Nofriansyah+4 more
openalex +5 more sources
ECC: Elliptic Curve Cryptography-based Watchdog for Detecting Malicious Nodes
M Rudhra+4 more
openalex +2 more sources
Text Encryption in Android Chat Applications using Elliptical Curve Cryptography (ECC)
Abstract Information technology is an important aspect of human life that has provided comfort and ease in communicating. The most used communication technologies today is the smartphone, which is a mobile phone with the ability of a portable computer.
Dimas Natanael+2 more
openalex +3 more sources
An Adaptive Approach for image adaptive watermarking using Elliptical curve cryptography (ECC) [PDF]
Naveen Kumar+2 more
openalex +3 more sources
Elliptic Curve Cryptography (ECC) Brainpool Standard Curves and Curve Generation [PDF]
Manfred Lochter, Johannes Merkle
openalex +3 more sources
Conditional Privacy-Preserving Authentication Scheme Without Using Point Multiplication Operations Based on Elliptic Curve Cryptography (ECC) [PDF]
Existing conditional privacy-preserving authentication schemes utilized in Vehicular Ad-hoc Networks (VANETs) to satisfy security and privacy requirements essentially depend on point multiplication operations. Achieving repaid verification method of the message is commonly suffer performance efficiency from resulting overheads. We propose a conditional
Jalawi Sulaiman Alshudukhi+2 more
openalex +4 more sources