To see the other types of publications on this topic, follow the link: Elliptic Curve Cryptography (ECC).

Journal articles on the topic 'Elliptic Curve Cryptography (ECC)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Elliptic Curve Cryptography (ECC).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Yan, Yuhan. "The Overview of Elliptic Curve Cryptography (ECC)." Journal of Physics: Conference Series 2386, no. 1 (2022): 012019. http://dx.doi.org/10.1088/1742-6596/2386/1/012019.

Full text
Abstract:
Abstract Elliptic Curve Cryptography (ECC) is one of the strongest and most efficient cryptographic techniques in modern cryptography. This paper gives the following introduction: The introduction of cryptography’s development; the introduction of the elliptic curve; the principle of ECC; the horizontal comparison between ECC and other types of cryptography; the modern breakthrough of ECC; the applications of ECC; by using a method of literature review. The study’s findings indicate that this factor is responsible for the rapid historical development of cryptography, from the classical passwor
APA, Harvard, Vancouver, ISO, and other styles
2

Abhishek, Kunal, and E. George Dharma Prakash Raj. "Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography." Cybernetics and Information Technologies 21, no. 2 (2021): 70–88. http://dx.doi.org/10.2478/cait-2021-0020.

Full text
Abstract:
Abstract Short Weierstrass elliptic curves with underlying hard Elliptic Curve Discrete Logarithm Problem (ECDLP) are widely used in cryptographic applications. A notion of security called Elliptic Curve Cryptography (ECC) security is also suggested in literature to safeguard the elliptic curve cryptosystems from their implementation flaws. In this paper, a new security notion called the “trusted security” is introduced for computational method of elliptic curves for cryptography. We propose three additional “trusted security acceptance criteria” which need to be met by the elliptic curves aim
APA, Harvard, Vancouver, ISO, and other styles
3

Jebrane, Jihane, Akram Chhaybi, Saiida Lazaar, and Abderrahmane Nitaj. "Elliptic Curve Cryptography with Machine Learning." Cryptography 9, no. 1 (2024): 3. https://doi.org/10.3390/cryptography9010003.

Full text
Abstract:
Elliptic Curve Cryptography (ECC) is a technology based on the arithmetic of elliptic curves used to build strong and efficient cryptosystems and infrastructures. Several ECC systems, such as the Diffie–Hellman key exchange and the Elliptic Curve Digital Signature Algorithm, are deployed in real-life applications to enhance the security and efficiency of digital transactions. ECC has gained even more importance since the introduction of Bitcoin, the peer-to-peer electronic cash system, by Satoshi Nakamoto in 2008. In parallel, the integration of artificial intelligence, particularly machine le
APA, Harvard, Vancouver, ISO, and other styles
4

Alshar’e, Marwan, Sharf Alzu’bi, Ahed Al-Haraizah, Hamzah Ali Alkhazaleh, Malik Jawarneh, and Mohammad Rustom Al Nasar. "Elliptic curve cryptography based light weight technique for information security." Bulletin of Electrical Engineering and Informatics 14, no. 3 (2025): 2300–2308. https://doi.org/10.11591/eei.v14i3.8587.

Full text
Abstract:
Recent breakthroughs in cryptographic technology are being thoroughly scrutinized due to their emphasis on innovative approaches to design, implementation, and attacks. Lightweight cryptography (LWC) is a technological advancement that utilizes a cryptographic algorithm capable of being adjusted to function effectively in various constrained environments. This study provides an in-depth analysis of elliptic curve cryptography (ECC), which is a type of asymmetric cryptographic method known as LWC. This cryptographic approach operates over elliptic curves and has two applications: key exchange a
APA, Harvard, Vancouver, ISO, and other styles
5

Duka, Mariusz. "ELLIPTIC-CURVE CRYPTOGRAPHY (ECC) AND ARGON2 ALGORITHM IN PHP USING OPENSSL AND SODIUM LIBRARIES." Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska 10, no. 3 (2020): 91–94. http://dx.doi.org/10.35784/iapgos.897.

Full text
Abstract:
This paper presents the elliptic-curve cryptography (ECC) and Argon2 algorithm in PHP using OpenSSL and Sodium cryptographic libraries. The vital part of this thesis presents an analysis of the efficiency of elliptic-curve cryptography (ECC) and the Argon2 hashing algorithm in the Sodium library, depending on the variation of initiation parameters.
APA, Harvard, Vancouver, ISO, and other styles
6

Michael, Nsikan John, Otobong. G. Udoaka, and Musa Alex. "SYMMETRIC BILINEAR CRYPTOGRAPHY ON ELLIPTIC CURVE AND LIE ALGEBRA." GPH - International Journal of Mathematics 06, no. 10 (2023): 01–10. https://doi.org/10.5281/zenodo.10252317.

Full text
Abstract:
<strong>Elliptic Curve Cryptography (ECC) has gained widespread adoption in the field of cryptography due to its efficiency and security properties. Symmetric bilinear pairings on elliptic curves have emerged as a powerful tool in cryptographic protocols, enabling advanced constructions and functionalities. This paper explores the intersection of symmetric bilinear pairings, elliptic curves, and Lie algebras in the context of cryptography. We provide a comprehensive overview of the theoretical foundations, applications, and security considerations of this amalgamation.</strong>
APA, Harvard, Vancouver, ISO, and other styles
7

Obukhov, Vadim, Zulayho Qadamova, Muzaffar Sobirov, Otabek Ergashev, and Ravshanbek Nabijonov. "Methods for using elliptic curves in cryptography." E3S Web of Conferences 508 (2024): 05009. http://dx.doi.org/10.1051/e3sconf/202450805009.

Full text
Abstract:
Elliptic Curve Cryptography (ECC), a significant modern cryptography, is more secure and robust than most others due to its construction using an elliptic curve and the application of mathematical operations for encryption and key generation. Furthermore, ECC based on elliptic curves can continually enhance speed and intensity through improvements in accelerators, scalar multiplication, and order processing speed.
APA, Harvard, Vancouver, ISO, and other styles
8

Miao, Zhe. "Elliptic curve cryptography: Theory, security, and applications in modern network security." Theoretical and Natural Science 51, no. 1 (2024): 114–20. http://dx.doi.org/10.54254/2753-8818/51/2024ch0183.

Full text
Abstract:
Abstract. Due to the swift advancement of Internet and computer technology in the 21st century, the demand for network security is increasing. Classic cryptographic algorithms like Rivest-Shamir-Adleman (RSA) and Digital Signature Algorithm (DSA) are insufficient in the face of modern network environments, while elliptic curve cryptography (ECC) has become a research hotspot due to its high security and high efficiency. The purpose of this paper is to discuss the theoretical basis, security analysis, and practical application cases of elliptic curve cryptography, to provide readers with a comp
APA, Harvard, Vancouver, ISO, and other styles
9

Zahra, Della Annisa, Rini Marwati, and Ririn Sispiyati. "Kriptografi Visual pada Gambar Berwarna (RGB) Menggunakan Algoritma Elliptic Curve Cryptography." Jurnal EurekaMatika 9, no. 2 (2021): 141–50. http://dx.doi.org/10.17509/jem.v9i2.40054.

Full text
Abstract:
Cryptography held an important role in the digital era for securing data from hackers. As technology develops, types of data that can be secured using cryptography is expanding, one of which is securing images using visual cryptography. Visual cryptography is a cryptosystem that splits an image into parts and can only be solved if it has all parts of the image. Another type of cryptography that can be used to secure data is Elliptic Curve Cryptography (ECC). ECC uses a field of prime numbers consists of points on the elliptic curve as a technique to secure data. In this research, a cryptosyste
APA, Harvard, Vancouver, ISO, and other styles
10

T. Anupreethi. "Cryptographic Application of Elliptic Curve generated through the formation of Diophantine triples using Hex Numbers and Pronic Numbers." Communications on Applied Nonlinear Analysis 32, no. 9s (2025): 836–40. https://doi.org/10.52783/cana.v32.4017.

Full text
Abstract:
A public-key encryption technique akin to RSA can be referred to as elliptic curve cryptography (ECC). While RSA's security relies on huge prime numbers, ECC leverages the mathematical idea of elliptic curves to offer the same level of security with much smaller keys. In this paper, we will discuss elliptic curves and examine their applications in cryptography. A Diophantine pair of Hex numbers and Pronic numbers is extended to a Diophantine triple with appropriate property, that generates the elliptic curve and perform the encryption-decryption process.
APA, Harvard, Vancouver, ISO, and other styles
11

Weku, Winsy. "Model Proyeksi (X/Z2, Y/Z2) pada Kurva Hesian Secara Paralel Menggunakan Mekanisme Kriptografi Kurva Eliptik." JURNAL ILMIAH SAINS 12, no. 1 (2012): 65. http://dx.doi.org/10.35799/jis.12.1.2012.404.

Full text
Abstract:
MODEL PROYEKSI (X/Z2, Y/Z2) PADA KURVA HESIAN SECARA PARALEL MENGGUNAKAN MEKANISME KRIPTOGRAFI KURVA ELIPTIKABSTRAK Suatu kunci publik, Elliptic Curve Cryptography (ECC) dikenal sebagai algoritma yang paling aman yang digunakan untuk memproteksi informasi sepanjang melakukan transmisi. ECC dalam komputasi aritemetika didapatkan berdasarkan operasi inversi modular. Inversi modular adalah operasi aritmetika dan operasi yang sangat panjang yang didapatkan berdasar ECC crypto-processor. Penggunaan koordinat proyeksi untuk menentukan Kurva Eliptik/ Elliptic Curves pada kenyataannya untuk memastikan
APA, Harvard, Vancouver, ISO, and other styles
12

Sangeetha, V., T. Anupreethi, and Manju Somanath. "Cryptographic Application of Elliptic Curve Generated through Centered Hexadecagonal Numbers." Indian Journal Of Science And Technology 17, no. 20 (2024): 2074–78. http://dx.doi.org/10.17485/ijst/v17i20.1183.

Full text
Abstract:
Background/Objectives: Elliptic Curve Cryptography (ECC) is a public-key encryption method that is similar to RSA. ECC uses the mathematical concept of elliptic curves to achieve the same level of security with significantly smaller keys, whereas RSA's security depends on large prime numbers. Elliptic curves and their applications in cryptography will be discussed in this paper. The elliptic curve is formed by the extension of a Diophantine pair of Centered Hexadecagonal numbers to a Diophantine triple with property D(8). Method: The Diffie–Hellman key exchange, named for Whitfield Diffie and
APA, Harvard, Vancouver, ISO, and other styles
13

V, Sangeetha, Anupreethi T, and Somanath Manju. "Cryptographic Application of Elliptic Curve Generated through Centered Hexadecagonal Numbers." Indian Journal of Science and Technology 17, no. 20 (2024): 2074–78. https://doi.org/10.17485/IJST/v17i20.1183.

Full text
Abstract:
Abstract <strong>Background/Objectives:</strong>&nbsp;Elliptic Curve Cryptography (ECC) is a public-key encryption method that is similar to RSA. ECC uses the mathematical concept of elliptic curves to achieve the same level of security with significantly smaller keys, whereas RSA's security depends on large prime numbers. Elliptic curves and their applications in cryptography will be discussed in this paper. The elliptic curve is formed by the extension of a Diophantine pair of Centered Hexadecagonal numbers to a Diophantine triple with property D(8).&nbsp;<strong>Method:</strong>&nbsp;The Di
APA, Harvard, Vancouver, ISO, and other styles
14

Taqwa, Ainur Rilo, and Danang Haryo Sulaksono. "IMPLEMENTASI KRIPTOGRAFI DENGAN METODE ELLIPTIC CURVE CRYPTOGRAPHY (ECC) UNTUK APLIKASI CHATTING DALAM CLOUD COMPUTING BERBASIS ANDROID." KERNEL: Jurnal Riset Inovasi Bidang Informatika dan Pendidikan Informatika 1, no. 1 (2020): 42–48. http://dx.doi.org/10.31284/j.kernel.2020.v1i1.929.

Full text
Abstract:
in general, information dissemination facilities in the current technological era can be done quicklyand easily through the android application media. One of the most frequently used media forinformation dissemination is chatting. The problem with this research is that the chat application allowssomeone to send messages or files to other users who have access rights, with the risk that the data willbe seen by anyone who has access rights in it. This can happen because in the chat application can seeanything that is shared as long as you have access rights, but sometimes there is some data that
APA, Harvard, Vancouver, ISO, and other styles
15

Thanh, Dinh Tien, Nguyen Quoc Toan, Nguyen Van Son, and Nguyen Van Duan. "An algorithm to select a secure twisted elliptic curve in cryptography." Journal of Science and Technology on Information security 1, no. 15 (2022): 17–25. http://dx.doi.org/10.54654/isj.v1i15.832.

Full text
Abstract:
Abstract—Fault attack is a powerful adjacency channel attack technique to break cryptographic schemes. On elliptic curve cryptography (ECC), fault attacks can be divided into three types: safeerror attacks, weak-curve-based attacks, and differential fault attacks. In the paper [1], the author has presented the fault attack on the elliptic curve cryptosystem based on the quadratic twist curve and Proposed criteria to resist elliptic fault attack on the elliptic curve. In this paper, we propose an algorithm to choose a twist secure elliptic curve and evaluate the paths published in cryptographic
APA, Harvard, Vancouver, ISO, and other styles
16

Ranjita and Gautam Kumar Rajput Dr. "Role of data security in elliptic curve cryptography." International Journal of Trends in Emerging Research and Development 1, no. 1 (2024): 281–85. https://doi.org/10.5281/zenodo.13643253.

Full text
Abstract:
Elliptic Curve Cryptography (ECC) has emerged as a powerful tool in modern cryptographic systems, offering high security with relatively small key sizes. As data security becomes increasingly critical in the digital age, ECC's role in safeguarding information is more prominent than ever. This paper explores the significance of data security within the framework of ECC, emphasizing its efficiency, scalability, and robustness against attacks. By leveraging the mathematical properties of elliptic curves, ECC provides strong encryption while minimizing computational overhead, making it ideal for r
APA, Harvard, Vancouver, ISO, and other styles
17

Trung, Mai Manh, Le Phe Do, Do Trung Tuan, Nguyen Van Tanh, and Ngo Quang Tri. "Design a cryptosystem using elliptic curves cryptography and Vigenère symmetry key." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 1734. http://dx.doi.org/10.11591/ijece.v13i2.pp1734-1743.

Full text
Abstract:
In this paper describes the basic idea of elliptic curve cryptography (ECC) as well as Vigenère symmetry key. Elliptic curve arithmetic can be used to develop elliptic curve coding schemes, including key exchange, encryption, and digital signature. The main attraction of elliptic curve cryptography compared to Rivest, Shamir, Adleman (RSA) is that it provides equivalent security for a smaller key size, which reduces processing costs. From the theorical basic, we proposed a cryptosystem using elliptic curves and Vigenère cryptography. We proposed and implemented our encryption algorithm in an i
APA, Harvard, Vancouver, ISO, and other styles
18

Trung, Mai Manh, Le Phe Do, Do Trung Tuan, et al. "The comparison of several cryptosystems using the elliptic curve: a report." International Journal of Electrical and Computer Engineering (IJECE) 14, no. 5 (2024): 5319. http://dx.doi.org/10.11591/ijece.v14i5.pp5319-5329.

Full text
Abstract:
The elliptic curve cryptosystem (ECC) has several applications in Information Security, especially in cryptography with two main activities including encrypting and decrypting. There were several solutions of different research teams which propose various forms of the elliptic curve cryptosystem on cryptographic sector. In the paper, we proposed a solution for applying the elliptic curve on cryptography which is based on these proposals as well as basic idea about the elliptic curve cryptosystem. We also make comparison between our proposal and other listed solution in the same application of
APA, Harvard, Vancouver, ISO, and other styles
19

Purwiko, Daniel Perdana Putra, Favian Dewanta, and Farah Afianti. "ANALISIS PENGGUNAAN ECC PADA SISTEM AUTENTIKASI DI IOT." MULTINETICS 8, no. 1 (2022): 42–49. http://dx.doi.org/10.32722/multinetics.v8i1.4701.

Full text
Abstract:
Internet of Things adalah sistem kompleks yang banyak digunakan dalam banyak cara untuk memajukan kehidupan manusia. Akibatnya, Internet of Things (IoT) memiliki banyak kerentanan keamanan dan memerlukan sistem autentikasi untuk melindungi data pengguna. Memilih jenis autentikasi yang sesuai dengan kebutuhan Anda sangat penting untuk mencapai kinerja yang sangat baik pada perangkat Internet of Things (IoT) Anda dengan spesifikasi yang relatif minimal. Karena situasi ini, algoritma Elliptic Curve Cryptography (ECC) adalah salah satu algoritma yang pasti yang mengkonsumsi lebih sedikit sumber da
APA, Harvard, Vancouver, ISO, and other styles
20

Mai, Manh Trung, Phe Do Le, Trung Tuan Do, Van Tanh Nguyen, and Quang Tri Ngo. "Design a cryptosystem using elliptic curves cryptography and Vigenère symmetry key." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (2023): 1734–43. https://doi.org/10.11591/ijece.v13i2.pp1734-1743.

Full text
Abstract:
In this paper describes the basic idea of elliptic curve cryptography (ECC) as well as Vigen&egrave;re symmetry key. Elliptic curve arithmetic can be used to develop elliptic curve coding schemes, including key exchange, encryption, and digital signature. The main attraction of elliptic curve cryptography compared to Rivest, Shamir, Adleman (RSA) is that it provides equivalent security for a smaller key size, which reduces processing costs. From the theorical basic, we proposed a cryptosystem using elliptic curves and Vigen&egrave;re cryptography. We proposed and implemented our encryption alg
APA, Harvard, Vancouver, ISO, and other styles
21

Maimuţ, Diana, and Alexandru Cristian Matei. "Speeding-Up Elliptic Curve Cryptography Algorithms." Mathematics 10, no. 19 (2022): 3676. http://dx.doi.org/10.3390/math10193676.

Full text
Abstract:
In recent decades there has been an increasing interest in Elliptic curve cryptography (ECC) and, especially, the Elliptic Curve Digital Signature Algorithm (ECDSA) in practice. The rather recent developments of emergent technologies, such as blockchain and the Internet of Things (IoT), have motivated researchers and developers to construct new cryptographic hardware accelerators for ECDSA. Different types of optimizations (either platform dependent or algorithmic) were presented in the literature. In this context, we turn our attention to ECC and propose a new method for generating ECDSA modu
APA, Harvard, Vancouver, ISO, and other styles
22

Jayanti, Sravani, K. Chittibabu, and Chandra Sekhar Akkapeddi. "A Cryptosystem of Skewed Affine Cipher of Multiple Keys." ECS Transactions 107, no. 1 (2022): 15071–80. http://dx.doi.org/10.1149/10701.15071ecst.

Full text
Abstract:
In this era, where communication over technology has become vital, the reliability of the same is of utmost need. Cryptography ensures confidentiality, user authentication, and integrity of data. One of the techniques is the Elliptic Curve Cryptography (ECC). Several classical ciphers are designed based on mathematical backgrounds. In this paper, we focus on combining Affine Cipher and ECC to magnify the security provided by an Affine cipher. Hence a skewed Affine cipher that uses multiple keys over Elliptic curves is proposed. The keys chosen are derived from the points on the specified Ellip
APA, Harvard, Vancouver, ISO, and other styles
23

Maheswari, M., R. A. Karthika, and Anuska Chatterjee. "Implementation Methodology of ECC to Overcome Side Channel Attacks." International Journal of Engineering & Technology 7, no. 3.27 (2018): 421. http://dx.doi.org/10.14419/ijet.v7i3.27.17989.

Full text
Abstract:
Elliptic Curve Cryptography (ECC) is a form of public-key cryptography. This implies that there is the involvement of a private key and a public key for the purpose of cryptography. ECC can be used for a wide range of applications. The keys used are much smaller than the non-ECC cryptographic algorithms. 256 bit and 384 bit ECC are used by NSA for storage of classified intel as ECC is considered to be a part of suit B cryptography by the NSA. When it comes to normal usage, other versions of ECC are used. So, many of the applications protected by ECC are vulnerable to side channel attacks. So,
APA, Harvard, Vancouver, ISO, and other styles
24

Domathoti, Manasa, Sai Kowsik Ayyalasomayajula, Venkata Kishore Karri, and Lokesh M. "Hiding Data Using Efficient Combination of ECC And Compression Steganography Techniques." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem42798.

Full text
Abstract:
Ensuring safe and efficient data hiding is crucial in cybersecurity, as traditional methods like RSA and Huffman Coding face scalability and efficiency challenges. This paper proposes a steganographic system that integrates advanced cryptographic and compression techniques to enhance security and performance. Elliptic Curve Cryptography (ECC) is used for encryption, providing strong security with smaller key sizes, reducing computational overhead compared to RSA. A hybrid compression approach combining Lempel-Ziv-Welch (LZW) and Huffman Coding improves storage and transmission efficiency. Impl
APA, Harvard, Vancouver, ISO, and other styles
25

Ojha, D. B., Ms Shree, A. Dwivedi, and A. Mishra. "An approach for Embedding Elliptic Curve in Fractal Based Digital Signature Scheme." Journal of Scientific Research 3, no. 1 (2010): 75. http://dx.doi.org/10.3329/jsr.v3i1.4694.

Full text
Abstract:
We established a new approach for cryptographic digital signature scheme based on Mandelbrot and Julia fractal sets. We have embedded the features of ECC (elliptic curve cryptography) to the digital signature scheme based on Mandelbrot and Julia fractal sets. We offered a digital signature that has advantages of both the fractal based digital signature as well as of elliptic curve digital signature.Keywords: Fractal; ECC; Digital signature.© 2011 JSR Publications. ISSN: 2070-0237 (Print); 2070-0245 (Online). All rights reserved.doi:10.3329/jsr.v3i1.4694 J. Sci. Res. 3 (1), 75-79 (2011)
APA, Harvard, Vancouver, ISO, and other styles
26

Wu, Huangwei. "General analysis on essential mathematical principles of elliptic curve cryptography." Theoretical and Natural Science 10, no. 1 (2023): 123–29. http://dx.doi.org/10.54254/2753-8818/10/20230327.

Full text
Abstract:
Prevalent is the practical application of Elliptic Curve Cryptography (ECC) in the modern public-key cryptosystem, especially the implementation of ECC algorithm in Bitcoin source code. With the thorough introduction of discrete logarithm and Diffie-Hellman key exchange, ECC has gradually progressed to be sophisticated and efficient simultaneously. Therefore, it currently has been widely regarded as the successor of RSA algorithm in terms of inheritance for its shorter lengths of keys, faster speed and higher safety under the same encryption strength. Due to the potential safety and complexity
APA, Harvard, Vancouver, ISO, and other styles
27

Elhajj, Mohammed, and Pim Mulder. "A Comparative Analysis of the Computation Cost and Energy Consumption of Relevant Curves of ECC Presented in Literature." International Journal of Electrical and Computer Engineering Research 3, no. 1 (2023): 1–6. http://dx.doi.org/10.53375/ijecer.2023.318.

Full text
Abstract:
With the Internet of Things (IoT) becoming expo-nentially more prevalent, the need for lightweight cryptography functions increases simultaneously. Namely, IoT end devices are mostly limited by their resource-constrained capabilities and therefore cannot rely on heavyweight cryptographic algorithms such as Rivest-Shamir-Adleman (RSA) or Diffie-Hellman (DH) for security. Elliptic Curve Cryptography (ECC) offers a more lightweight alternative by being based on a mathematical prob-lem named the Elliptic Curve Discrete Logarithm Problem (ECDLP) which is not known to be solvable in sub-exponential
APA, Harvard, Vancouver, ISO, and other styles
28

Trung, Mai Manh, Le Phe Do, and Do Trung Tuan. "Building Elliptic Curve Cryptography With Public Key To Encrypt Vietnamese Text." Journal of Science and Technology on Information security 1, no. 15 (2022): 119–26. http://dx.doi.org/10.54654/isj.v1i15.854.

Full text
Abstract:
Abstract—Today, Elliptic Curve Cryptography (ECC) has many practical applications. ECC was a direction in lightweight primitive cryptography. This paper is based on the arithmetic idea of an Elliptic curve. Elliptic curve arithmetic can be used to develop Elliptic curve encryption schemes such as key exchange, encryption, and digital signature. Compared with traditional cryptosystems with the same level of security, Elliptic curve cryptography has a smaller key size, reducing processing costs. To encode the Vietnamese text, we are based on the sound of Vietnamese characters to make a table of
APA, Harvard, Vancouver, ISO, and other styles
29

El Kinani, E. H., and Fatima Amounas. "Proposed Developments of Blind Signature Scheme based on The Elliptic Curve Discrete Logarithm Problem." Computer Engineering and Applications Journal 2, no. 1 (2013): 151–60. http://dx.doi.org/10.18495/comengapp.v2i1.16.

Full text
Abstract:
In recent years, Elliptic Curve Cryptography (ECC) has attracted the attention of researchers due to its robust mathematical structure and highest security compared to other existing algorithm like RSA. Our main objective in this work was to provide a novel blind signature scheme based on ECC. The security of the proposed method results from the infeasibility to solve the discrete logarithm over an elliptic curve. In this paper we introduce a proposed to development the blind signature scheme with more complexity as compared to the existing schemes. Keyword: Cryptography, Blind Signature, Ell
APA, Harvard, Vancouver, ISO, and other styles
30

Sundararajan, Ananiah Durai Durai, and Rajashree R. "A Comprehensive Survey on Lightweight Asymmetric Key Cryptographic Algorithm for Resource Constrained Devices." ECS Transactions 107, no. 1 (2022): 7457–68. http://dx.doi.org/10.1149/10701.7457ecst.

Full text
Abstract:
Elliptic Curve Cryptography, being a popular lightweight asymmetric key cryptographic algorithm that is widely adapted to meet high security requirement of resource constrained devices, were surveyed in this work. Further, ECC-based ElGamal cryptosystem, Elliptic Curve Digital Signature Algorithm, and Elliptic Curve Diffie Hellman Key Exchange Algorithm have been comprehensively reviewed with its characteristics and preferred applications. In addition, few related work are analyzed and suggestions for suitable target applications were provided. Moreover, ECC being a popular asymmetric key cryp
APA, Harvard, Vancouver, ISO, and other styles
31

M, Rudhra, Sathya Lakshmi N, Thenmozhi S, Tamizhenthi A, and Nandhagopal N. "ECC: Elliptic Curve Cryptography-based Watchdog for Detecting Malicious Nodes." SIJ Transactions on Computer Networks & Communication Engineering 05, no. 04 (2017): 04–08. http://dx.doi.org/10.9756/sijcnce/v5i4/05010120101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Upadhyay, Bipin Chandra, and Priyanka Sirola. "A STUDY ON ELLIPTIC CURVE, ITS PROPERTIES AND APPLICATIONS." International Journal of Engineering Science and Humanities 3, no. 1 (2013): 41–47. http://dx.doi.org/10.62904/1nhrs467.

Full text
Abstract:
Elliptic curve cryptography (ECC) is a kind of public key cryptosystem. In this paper, we will present some ECC algorithms and also give mathematical explanations on the working of these algorithms. Also we will discuss Elliptic curve in its application in digital signature generation and verification so as to securely transmit the data across different users.
APA, Harvard, Vancouver, ISO, and other styles
33

Abdulnabi, Mohamed Wameedh. "Elliptic Curve Implementation and its Applications: A Review." Iraqi Journal of Intelligent Computing and Informatics (IJICI) 2, no. 2 (2023): 90–100. http://dx.doi.org/10.52940/ijici.v2i2.39.

Full text
Abstract:
Encryption is regarded as essential within the safety measures used to protect data via unsafe transport methods. Elliptic Curve encryption (ECC), one of the several asymmetric encryption algorithms currently in use, has become popular because of its high level of security and small key sizes. In contrast to Rivest, Shamir and Adleman (RSA), for instance, ECC can keep security levels at a certain level with a smaller key. The primary purpose of ECC is elliptic curve point multiply (ECPM), which also has the largest hardware cost. Numerous hardware applications have been made to accelerate the
APA, Harvard, Vancouver, ISO, and other styles
34

Vamsi, Desam, and Pradeep Reddy CH. "Hybrid Image Encryption Using Elliptic Curve Cryptography, Hadamard Transform and Hill Cipher." Webology 19, no. 1 (2022): 2357–78. http://dx.doi.org/10.14704/web/v19i1/web19160.

Full text
Abstract:
In this digital world, communication systems have witnessed abundant usage of media over the platforms. Among these, providing security in transmission of images is highly important, and attained a lot of research interest due to its high consideration in both the industry and the academic community. This paper proposes a hybrid asymmetric image encryption algorithm using Elliptic curve cryptosystem (ECC), Hadamard transform and Hill cipher algorithms. Based on the Diffie–Hellman public key exchange method a point on the elliptic curve is selected and agreed between both the sender and receive
APA, Harvard, Vancouver, ISO, and other styles
35

Josepha Menandas J. and Mary Subaja Christo. "Chinese Remainder Theorem-Based Encoding of Text to Point Elliptic Curve Cryptography." Journal of Advanced Research in Applied Sciences and Engineering Technology 47, no. 2 (2024): 148–59. http://dx.doi.org/10.37934/araset.47.2.148159.

Full text
Abstract:
One of the most crucial requirements in this digital age is data security. The number of data usage increased drastically now a days, but how far the data is secured is the very big problem, though we have enough cryptographic algorithms for securing real time applications, but the level of the security against modern attacks is not determined. Elliptic Curve based Cryptography (ECC) is the most important cryptographic algorithm for confidentiality and authentication, providing high security level with small length keys when compared to other asymmetric algorithms like RSA, Diffie-Hellman, etc
APA, Harvard, Vancouver, ISO, and other styles
36

Ms., A. A. Deshmukh, Manali Dubal Ms., Mahesh TR Dr., and C. R. Chauhan Mr. "DATA SECURITY ANALYSIS AND SECURITY EXTENSION FOR SMART CARDS USING JAVA CARD." International Journal of Advanced Information Technology (IJAIT) 2, no. 2 (2012): 41–57. https://doi.org/10.5281/zenodo.3534867.

Full text
Abstract:
Smart cards improve the convenience and security of any transaction. They provide tamper-proof storage of user and account identity. Multifunction cards are used to manage network system access, store value and other data. The cards carry personal account, credit and buying-preference information and thus, security becomes a primary issue here. Public Key Cryptography plays an essential role in electronic banking and financial transactions. ECC is one of the best public key techniques for its small key size, high security and is suitable for secure access of smart cards. This article gives pri
APA, Harvard, Vancouver, ISO, and other styles
37

Mutar, Ahmed Fakhir, Leyli Mohammad Khanli, and Hojjat Emami. "A hybrid cryptographic and deep learning approach for IoT device security." Journal of Discrete Mathematical Sciences and Cryptography 28, no. 4-B (2025): 1437–49. https://doi.org/10.47974/jdmsc-2289.

Full text
Abstract:
A seamless network of connected things and automated processes have transformed a variety of industries thanks to the Internet of Things (IoT). In addition to introducing significant security vulnerabilities, IoT devices are also susceptible to cyberattacks due to their limited computing power. There is no doubt that traditional cryptographic techniques provide a foundation of security, but they are often inadequate to counter sophisticated attacks. A hybrid security framework is presented in this paper that combines enhanced Elliptic Curve Cryptography (ECC) algorithms with deep learning-base
APA, Harvard, Vancouver, ISO, and other styles
38

Routis, George, Panagiotis Dagas, and Ioanna Roussaki. "Enhancing Privacy in the Internet of Vehicles via Hyperelliptic Curve Cryptography." Electronics 13, no. 4 (2024): 730. http://dx.doi.org/10.3390/electronics13040730.

Full text
Abstract:
The Internet of Things (IoT) is a technological paradigm that has gained significant momentum the last decade and, among other features, enables the development of intelligent and interoperable device networks. In this respect, it has triggered the creation and evolution of vehicular ad-hoc networks (VANETs), which are initially implemented in order to guarantee the safety of drivers and the avoidance of traffic accidents. The drawback is that this fast evolution comes with serious concerns in terms of the privacy of users, while the population of attackers or entities that try to eavesdrop an
APA, Harvard, Vancouver, ISO, and other styles
39

Metrilitna Br Sembiring. "ELLIPTIC CURVE CRYPTOGRAPHY (ECC) PADA PROSES PERTUKARAN KUNCI PUBLIK DIFFIE-HELMAN." Visipena Journal 6, no. 1 (2015): 25–33. http://dx.doi.org/10.46244/visipena.v6i1.351.

Full text
Abstract:
Elliptic Curve Cryptography (ECC) pada Proses Pertukaran Kunci Publik Diffie-Hellman. Dalam tugas akhir ini dibahas mengenai algoritma kriptografi kurva elliptik untuk enkripsi dan dekripsi data. Metode yang digunakan adalah dengan menggunakan kunci publik Diffie-Hellman. Hasil yang telah dilakukan bahwa hasil pertukaran kunci antara dua user menggunakan pertukaran Diffie-Hellman memberikan titik ke tiga (kunci private bersama) yang sama antara ke dua user tersebut.
APA, Harvard, Vancouver, ISO, and other styles
40

Dar, Muneer Ahmad, Aadil Askar, Daliya Alyahya, and Sameer Ahmad Bhat. "Lightweight and Secure Elliptical Curve Cryptography (ECC) Key Exchange for Mobile Phones." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 23 (2021): 89–103. http://dx.doi.org/10.3991/ijim.v15i23.26337.

Full text
Abstract:
Open networks enable data communication between different types of mobile devices that showcase the need to enforce elevated security measures. Securing sensitive or confidential data in mobile phones is accomplished by implementing a diverse range of cryptographic techniques. While encryption algorithms, such as Rivest–Shamir–Adleman (RSA) may offer secure solutions that are often difficult to compromise, these in turn prerequisite high speed computational resources for effective operation. Elliptical curve cryptography (ECC) is well thought-out standard that offers a workable and feasible me
APA, Harvard, Vancouver, ISO, and other styles
41

Judge, Lyndon, Suvarna Mane, and Patrick Schaumont. "A Hardware-Accelerated ECDLP with High-Performance Modular Multiplication." International Journal of Reconfigurable Computing 2012 (2012): 1–14. http://dx.doi.org/10.1155/2012/439021.

Full text
Abstract:
Elliptic curve cryptography (ECC) has become a popular public key cryptography standard. The security of ECC is due to the difficulty of solving the elliptic curve discrete logarithm problem (ECDLP). In this paper, we demonstrate a successful attack on ECC over prime field using the Pollard rho algorithm implemented on a hardware-software cointegrated platform. We propose a high-performance architecture for multiplication over prime field using specialized DSP blocks in the FPGA. We characterize this architecture by exploring the design space to determine the optimal integer basis for polynomi
APA, Harvard, Vancouver, ISO, and other styles
42

Pocarovsky, Stefan, Martin Koppl, and Milos Orgon. "Flawed implemented cryptographic algorithm in the Microsoft ecosystem." Journal of Electrical Engineering 73, no. 3 (2022): 190–96. http://dx.doi.org/10.2478/jee-2022-0025.

Full text
Abstract:
Abstract With the continuous development in the electronic chip field, the requirements for the security of IT infrastructures are also increasing. The need for ever-increasing key lengths in cryptography to maintain security cannot grow indefinitely. One of the solutions in the field of cryptography for using shorter keys while maintaining security is cryptography based on the principle of elliptic curves. Asymmetric elliptic curve cryptosystems lies in solving the discrete logarithm problem on an elliptic curve. However, not only secure algorithm but also its correct implementation is import
APA, Harvard, Vancouver, ISO, and other styles
43

D., Sudha Devi, Thilagavathy K., and Sai Krishnan Preethi. "AN EFFICIENT AND SECURE DIGITAL MULTISIGNATURE PROTOCOL BASED ON ECC." International Journal on Cryptography and Information Security (IJCIS) 5, no. 3/4 (2015): 15–21. https://doi.org/10.5281/zenodo.1246948.

Full text
Abstract:
ABSTRACT Digital Signatures play a crucial role today as it ensures authentication, integrity and non-repudiation of a digital message. Many researches are ongoing based on elliptic curve cryptography due to its significant high performance. In this paper we propose an efficient and secure digital multi-signature protocol based on elliptic curve cryptography. The proposed protocol is efficient with reduced time complexity as compared to Chen et al.[14], Sahu and Sharma [18] and Chande and Thakur&rsquo;s [20] digital multi-signature schemes. Also the proposed protocol overcomes the insider atta
APA, Harvard, Vancouver, ISO, and other styles
44

Kumar, Manoj, O. P., and Archana Saxena. "Elliptic Curve Cryptography (ECC) based Relational Database Watermarking." International Journal of Computer Applications 154, no. 6 (2016): 20–28. http://dx.doi.org/10.5120/ijca2016912159.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Ayyalasomayajula, Madan Mohan Tito, Hayder M. A. Ghanimi, M. Manimaran, et al. "Enhanced network security through algebraic cryptanalysis of elliptic curve cryptography." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 7 (2024): 2219–30. http://dx.doi.org/10.47974/jdmsc-2093.

Full text
Abstract:
The growing threat of cyberattacks has rendered the research of secure online systems an issue of concern. Elliptic Curve Cryptography (ECC) is an enhanced security benchmark that provides high-security levels with small key sizes. This work exhibits an Algebraic Cryptanalysis (AC) technique to evaluate and enhance ECC security systems with Gröbner Bases (GB). This paper investigates ECC vulnerabilities and recommends a technique for using GB to address the Elliptic Curve Discrete Logarithm Problem (ECDLP). Analysed amid conventional techniques such as Baby-Step Giant-Step (BS-GS), Pollard’s R
APA, Harvard, Vancouver, ISO, and other styles
46

Verri Lucca, Arielle, Guilherme Augusto Mariano Sborz, Valderi Reis Quietinho Leithardt, Marko Beko, Cesar Albenes Zeferino, and Wemerson Delcio Parreira. "A Review of Techniques for Implementing Elliptic Curve Point Multiplication on Hardware." Journal of Sensor and Actuator Networks 10, no. 1 (2020): 3. http://dx.doi.org/10.3390/jsan10010003.

Full text
Abstract:
Cryptography is considered indispensable among security measures applied to data concerning insecure means of transmission. Among various existent algorithms on asymmetric cryptography, we may cite Elliptic Curve Cryptography (ECC), which has been widely used due to its security level and reduced key sizes. When compared to Rivest, Shamir and Adleman (RSA), for example, ECC can maintain security levels with a shorter key. Elliptic Curve Point Multiplication (ECPM) is the main function in ECC, and is the component with the highest hardware cost. Lots of ECPM implementations have been applied on
APA, Harvard, Vancouver, ISO, and other styles
47

Singh Bhadoria, Anurag, and Anurag Jain. "A Review of Digital Signature Using Different Elliptic Cryptography Technique." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 8 (2016): 6976–78. http://dx.doi.org/10.24297/ijct.v15i8.1499.

Full text
Abstract:
Authentication and verification of digital data is important phase in internet based transaction and data access. For the authentication and verification used digital signature operation. For the operation of digital signature various cryptography techniques is used. The strength of cryptography technique measures the strength of digital signature. For the strength improvement various cryptography techniques is used such as RSA, ECC and some other bit level cryptography technique. In this paper present the review of digital signature technique basically based on elliptic curve cryptography tec
APA, Harvard, Vancouver, ISO, and other styles
48

CH. Neelima. "Minimising the Cipher Length of Elliptic Curve Cryptography Basing on Chebyshev Polynomial." Journal of Information Systems Engineering and Management 10, no. 38s (2025): 294–303. https://doi.org/10.52783/jisem.v10i38s.6850.

Full text
Abstract:
Introduction: Public Key Cryptography (PKC) is one of the key components of contemporary cryptographic systems, mainly employed for securing digital communications using protocols such as SSL and TLS. PKC relies on trapdoor functions, which are computationally easy in one direction but impossible to invert without access to a secret key. RSA and the Diffie-Hellman key exchange protocol are classical algorithms that have been extensively employed for secure data transfer. More recently, Elliptic Curve Cryptography (ECC) has been in the limelight because of its high security with compact key siz
APA, Harvard, Vancouver, ISO, and other styles
49

Ismail, N. H. M., and M. Y. Misro. "Bézier Coefficients Matrix for ElGamal Elliptic Curve Cryptosystem." Malaysian Journal of Mathematical Sciences 16, no. 3 (2022): 483–99. http://dx.doi.org/10.47836/mjms.16.3.06.

Full text
Abstract:
It is well-known that cryptography is a branch of secrecy in science and mathematics, which usually preserves the confidentiality and authenticity of the information, where its growth is parallel with the rapid evolution of the internet and communication. As one of the prominent public key cryptosystems, the Elliptic Curve Cryptosystem (ECC) offers efficiency and complex mathematical operations with a smaller bit compared to other types of public key schemes. Throughout the evolution of cryptography, ElGamal Elliptic Curve Cryptosystem (ElGamal ECC) revolved from ElGamal public key scheme for
APA, Harvard, Vancouver, ISO, and other styles
50

Harika B, Dr. "A Decentralized Approach to Academic Certificate Management Using Blockchain and IPFS." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 05 (2025): 1–9. https://doi.org/10.55041/ijsrem47151.

Full text
Abstract:
Abstract- The increasing incidence of forged academic certificates has necessitated the development of secure, verifiable systems for credential management. This research proposes a decentralized approach to academic certificate issuance, storage, sharing, and verification utilizing blockchain technology and the InterPlanetary File System (IPFS). The system leverages blockchain's immutability to ensure trust and transparency, while IPFS provides decentralized and tamper-proof certificate storage. Advanced cryptographic techniques, including Elliptic Curve Cryptography (ECC) and AES encryption,
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!