Journal articles on the topic 'Elliptic Curve Cryptography (ECC)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Elliptic Curve Cryptography (ECC).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Yan, Yuhan. "The Overview of Elliptic Curve Cryptography (ECC)." Journal of Physics: Conference Series 2386, no. 1 (December 1, 2022): 012019. http://dx.doi.org/10.1088/1742-6596/2386/1/012019.
Full textAbhishek, Kunal, and E. George Dharma Prakash Raj. "Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography." Cybernetics and Information Technologies 21, no. 2 (June 1, 2021): 70–88. http://dx.doi.org/10.2478/cait-2021-0020.
Full textDuka, Mariusz. "ELLIPTIC-CURVE CRYPTOGRAPHY (ECC) AND ARGON2 ALGORITHM IN PHP USING OPENSSL AND SODIUM LIBRARIES." Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska 10, no. 3 (September 30, 2020): 91–94. http://dx.doi.org/10.35784/iapgos.897.
Full textWeku, Winsy. "Model Proyeksi (X/Z2, Y/Z2) pada Kurva Hesian Secara Paralel Menggunakan Mekanisme Kriptografi Kurva Eliptik." JURNAL ILMIAH SAINS 12, no. 1 (April 30, 2012): 65. http://dx.doi.org/10.35799/jis.12.1.2012.404.
Full textTaqwa, Ainur Rilo, and Danang Haryo Sulaksono. "IMPLEMENTASI KRIPTOGRAFI DENGAN METODE ELLIPTIC CURVE CRYPTOGRAPHY (ECC) UNTUK APLIKASI CHATTING DALAM CLOUD COMPUTING BERBASIS ANDROID." KERNEL: Jurnal Riset Inovasi Bidang Informatika dan Pendidikan Informatika 1, no. 1 (November 6, 2020): 42–48. http://dx.doi.org/10.31284/j.kernel.2020.v1i1.929.
Full textThanh, Dinh Tien, Nguyen Quoc Toan, Nguyen Van Son, and Nguyen Van Duan. "An algorithm to select a secure twisted elliptic curve in cryptography." Journal of Science and Technology on Information security 1, no. 15 (June 8, 2022): 17–25. http://dx.doi.org/10.54654/isj.v1i15.832.
Full textMaimuţ, Diana, and Alexandru Cristian Matei. "Speeding-Up Elliptic Curve Cryptography Algorithms." Mathematics 10, no. 19 (October 7, 2022): 3676. http://dx.doi.org/10.3390/math10193676.
Full textTrung, Mai Manh, Le Phe Do, Do Trung Tuan, Nguyen Van Tanh, and Ngo Quang Tri. "Design a cryptosystem using elliptic curves cryptography and Vigenère symmetry key." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (April 1, 2023): 1734. http://dx.doi.org/10.11591/ijece.v13i2.pp1734-1743.
Full textPurwiko, Daniel Perdana Putra, Favian Dewanta, and Farah Afianti. "ANALISIS PENGGUNAAN ECC PADA SISTEM AUTENTIKASI DI IOT." MULTINETICS 8, no. 1 (August 29, 2022): 42–49. http://dx.doi.org/10.32722/multinetics.v8i1.4701.
Full textJayanti, Sravani, K. Chittibabu, and Chandra Sekhar Akkapeddi. "A Cryptosystem of Skewed Affine Cipher of Multiple Keys." ECS Transactions 107, no. 1 (April 24, 2022): 15071–80. http://dx.doi.org/10.1149/10701.15071ecst.
Full textMaheswari, M., R. A. Karthika, and Anuska Chatterjee. "Implementation Methodology of ECC to Overcome Side Channel Attacks." International Journal of Engineering & Technology 7, no. 3.27 (August 15, 2018): 421. http://dx.doi.org/10.14419/ijet.v7i3.27.17989.
Full textElhajj, Mohammed, and Pim Mulder. "A Comparative Analysis of the Computation Cost and Energy Consumption of Relevant Curves of ECC Presented in Literature." International Journal of Electrical and Computer Engineering Research 3, no. 1 (March 15, 2023): 1–6. http://dx.doi.org/10.53375/ijecer.2023.318.
Full textM, Rudhra, Sathya Lakshmi N, Thenmozhi S, Tamizhenthi A, and Nandhagopal N. "ECC: Elliptic Curve Cryptography-based Watchdog for Detecting Malicious Nodes." SIJ Transactions on Computer Networks & Communication Engineering 05, no. 04 (August 31, 2017): 04–08. http://dx.doi.org/10.9756/sijcnce/v5i4/05010120101.
Full textOjha, D. B., Ms Shree, A. Dwivedi, and A. Mishra. "An approach for Embedding Elliptic Curve in Fractal Based Digital Signature Scheme." Journal of Scientific Research 3, no. 1 (December 19, 2010): 75. http://dx.doi.org/10.3329/jsr.v3i1.4694.
Full textSundararajan, Ananiah Durai Durai, and Rajashree R. "A Comprehensive Survey on Lightweight Asymmetric Key Cryptographic Algorithm for Resource Constrained Devices." ECS Transactions 107, no. 1 (April 24, 2022): 7457–68. http://dx.doi.org/10.1149/10701.7457ecst.
Full textTrung, Mai Manh, Le Phe Do, and Do Trung Tuan. "Building Elliptic Curve Cryptography With Public Key To Encrypt Vietnamese Text." Journal of Science and Technology on Information security 1, no. 15 (June 8, 2022): 119–26. http://dx.doi.org/10.54654/isj.v1i15.854.
Full textVamsi, Desam, and Pradeep Reddy CH. "Hybrid Image Encryption Using Elliptic Curve Cryptography, Hadamard Transform and Hill Cipher." Webology 19, no. 1 (January 20, 2022): 2357–78. http://dx.doi.org/10.14704/web/v19i1/web19160.
Full textEl Kinani, E. H., and Fatima Amounas. "Proposed Developments of Blind Signature Scheme based on The Elliptic Curve Discrete Logarithm Problem." Computer Engineering and Applications Journal 2, no. 1 (May 7, 2013): 151–60. http://dx.doi.org/10.18495/comengapp.v2i1.16.
Full textKumar, Manoj, O. P., and Archana Saxena. "Elliptic Curve Cryptography (ECC) based Relational Database Watermarking." International Journal of Computer Applications 154, no. 6 (November 17, 2016): 20–28. http://dx.doi.org/10.5120/ijca2016912159.
Full textMetrilitna Br Sembiring. "ELLIPTIC CURVE CRYPTOGRAPHY (ECC) PADA PROSES PERTUKARAN KUNCI PUBLIK DIFFIE-HELMAN." Visipena Journal 6, no. 1 (June 30, 2015): 25–33. http://dx.doi.org/10.46244/visipena.v6i1.351.
Full textDar, Muneer Ahmad, Aadil Askar, Daliya Alyahya, and Sameer Ahmad Bhat. "Lightweight and Secure Elliptical Curve Cryptography (ECC) Key Exchange for Mobile Phones." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 23 (December 8, 2021): 89–103. http://dx.doi.org/10.3991/ijim.v15i23.26337.
Full textJudge, Lyndon, Suvarna Mane, and Patrick Schaumont. "A Hardware-Accelerated ECDLP with High-Performance Modular Multiplication." International Journal of Reconfigurable Computing 2012 (2012): 1–14. http://dx.doi.org/10.1155/2012/439021.
Full textIsmail, N. H. M., and M. Y. Misro. "Bézier Coefficients Matrix for ElGamal Elliptic Curve Cryptosystem." Malaysian Journal of Mathematical Sciences 16, no. 3 (September 26, 2022): 483–99. http://dx.doi.org/10.47836/mjms.16.3.06.
Full textPocarovsky, Stefan, Martin Koppl, and Milos Orgon. "Flawed implemented cryptographic algorithm in the Microsoft ecosystem." Journal of Electrical Engineering 73, no. 3 (June 1, 2022): 190–96. http://dx.doi.org/10.2478/jee-2022-0025.
Full textVerri Lucca, Arielle, Guilherme Augusto Mariano Sborz, Valderi Reis Quietinho Leithardt, Marko Beko, Cesar Albenes Zeferino, and Wemerson Delcio Parreira. "A Review of Techniques for Implementing Elliptic Curve Point Multiplication on Hardware." Journal of Sensor and Actuator Networks 10, no. 1 (December 31, 2020): 3. http://dx.doi.org/10.3390/jsan10010003.
Full textSingh Bhadoria, Anurag, and Anurag Jain. "A Review of Digital Signature Using Different Elliptic Cryptography Technique." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 8 (May 24, 2016): 6976–78. http://dx.doi.org/10.24297/ijct.v15i8.1499.
Full textBhatia, Deepika. "Koblitz Curve- A Mapping Technique to Encipher/Decipher the Text message using Elliptic Curve Cryptography." Journal of Scientific Research 66, no. 04 (2022): 121–28. http://dx.doi.org/10.37398/jsr.2022.660417.
Full textHuque, Md Sirajul, Sk Bhadar Saheb, and Jayaram Boga. "An Approach to Secure Data Aggregation in Wireless Sensor Networks (WSN) using Asymmetric Homomorphic Encryption (Elliptic Curve Cryptography) Scheme." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (August 1, 2017): 263. http://dx.doi.org/10.23956/ijarcsse/v7i7/0162.
Full textDevarajan, Malathi, and N. Sasikaladevi. "An hyper elliptic curve based efficient signcryption scheme for user authentication." Journal of Intelligent & Fuzzy Systems 39, no. 6 (December 4, 2020): 8487–98. http://dx.doi.org/10.3233/jifs-189166.
Full textDi Matteo, Stefano, Luca Baldanzi, Luca Crocetti, Pietro Nannipieri, Luca Fanucci, and Sergio Saponara. "Secure Elliptic Curve Crypto-Processor for Real-Time IoT Applications." Energies 14, no. 15 (August 1, 2021): 4676. http://dx.doi.org/10.3390/en14154676.
Full textRathee, Geetanjali, and Hemraj Saini. "Authentication Through Elliptic Curve Cryptography (ECC) Technique in WMN." International Journal of Information Security and Privacy 12, no. 1 (January 2018): 42–52. http://dx.doi.org/10.4018/ijisp.2018010104.
Full textFan, Jing, Xuejun Fan, Ningning Song, and Long Wang. "Hyperelliptic Covers of Different Degree for Elliptic Curves." Mathematical Problems in Engineering 2022 (July 4, 2022): 1–11. http://dx.doi.org/10.1155/2022/9833393.
Full textKieu-Do-Nguyen, Binh, Cuong Pham-Quoc, Ngoc-Thinh Tran, Cong-Kha Pham, and Trong-Thuc Hoang. "Low-Cost Area-Efficient FPGA-Based Multi-Functional ECDSA/EdDSA." Cryptography 6, no. 2 (May 10, 2022): 25. http://dx.doi.org/10.3390/cryptography6020025.
Full textOladipupo, Esau Taiwo, and Oluwakemi Christiana Abikoye. "Improved authenticated elliptic curve cryptography scheme for resource starve applications." Computer Science and Information Technologies 3, no. 3 (November 1, 2022): 169–85. http://dx.doi.org/10.11591/csit.v3i3.p169-185.
Full textXiao, Yong, Weibin Lin, Yun Zhao, Chao Cui, and Ziwen Cai. "A High-Speed Elliptic Curve Cryptography Processor for Teleoperated Systems Security." Mathematical Problems in Engineering 2021 (January 22, 2021): 1–8. http://dx.doi.org/10.1155/2021/6633925.
Full textAlmajed, Hisham, Ahmad Almogren, and Mohammed Alabdulkareem. "iTrust—A Trustworthy and Efficient Mapping Scheme in Elliptic Curve Cryptography." Sensors 20, no. 23 (November 30, 2020): 6841. http://dx.doi.org/10.3390/s20236841.
Full textAdrian, Yosef, Chikana Friscilla, Nicholas Suardiman, Antoni Wijaya, and Sudimanto. "Analisa Perbandingan Waktu Enkripsi dan Dekripsi pada Algoritma ECC dan RSA." Media Informatika 21, no. 2 (October 3, 2022): 124–32. http://dx.doi.org/10.37595/mediainfo.v21i2.95.
Full textJoye, Marc. "Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited." Journal of Mathematical Cryptology 14, no. 1 (August 1, 2020): 254–67. http://dx.doi.org/10.1515/jmc-2019-0030.
Full textZhang, Ping, Yamin Li, and Huanhuan Chi. "An Elliptic Curve Signcryption Scheme and Its Application." Wireless Communications and Mobile Computing 2022 (May 6, 2022): 1–11. http://dx.doi.org/10.1155/2022/7499836.
Full textKanakam, Dr Sivarama Prasad. "ECDSA: The Virtual Signature Set of Rules of a Higher Internet." International Journal of Engineering and Computer Science 10, no. 10 (October 31, 2021): 25408–12. http://dx.doi.org/10.18535/ijecs/v10i10.4630.
Full textJimoh, R. G., M. AbdulRaheem, I. R. Salimonu, and O. V. Mejabi. "Elliptic Curve Cryptosystem in securing Communication across Unsecure Channel." Circulation in Computer Science 2, no. 5 (June 20, 2017): 7–12. http://dx.doi.org/10.22632/ccs-2017-251-97.
Full textDeb, Shomen, and Md Mokammel Haque. "Elliptic curve and pseudo-inverse matrix based cryptosystem for wireless sensor networks." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (October 1, 2019): 4479. http://dx.doi.org/10.11591/ijece.v9i5.pp4479-4492.
Full textShohaimay, Fairuz, and Eddie Shahril Ismail. "Improved and Provably Secure ECC-Based Two-Factor Remote Authentication Scheme with Session Key Agreement." Mathematics 11, no. 1 (December 20, 2022): 5. http://dx.doi.org/10.3390/math11010005.
Full textYang, Huiwei. "Application of Hybrid Encryption Algorithm in Hardware Encryption Interface Card." Security and Communication Networks 2022 (May 30, 2022): 1–11. http://dx.doi.org/10.1155/2022/7794209.
Full textSingh, Soram Ranbir, and Khan Kumar Ajoy. "Choosing a Suitable Public Cryptosystem for Internet of Things." Journal of Computational and Theoretical Nanoscience 17, no. 1 (January 1, 2020): 402–8. http://dx.doi.org/10.1166/jctn.2020.8682.
Full textKumar, L. Ashok, Sumit Srivastava, Balaji S. R., Francis H Shajin, and P. Rajesh. "Hybrid Visual and Optimal Elliptic Curve Cryptography for Medical Image Security in Iot." ECTI Transactions on Computer and Information Technology (ECTI-CIT) 16, no. 3 (August 19, 2022): 324–37. http://dx.doi.org/10.37936/ecti-cit.2022163.246991.
Full textIslam, Md Mainul, Md Selim Hossain, Moh Khalid Hasan, Md Shahjalal, and Yeong Min Jang. "Design and Implementation of High-Performance ECC Processor with Unified Point Addition on Twisted Edwards Curve." Sensors 20, no. 18 (September 10, 2020): 5148. http://dx.doi.org/10.3390/s20185148.
Full textShankar, K., and P. Eswaran. "RGB-Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique." Journal of Circuits, Systems and Computers 25, no. 11 (August 14, 2016): 1650138. http://dx.doi.org/10.1142/s0218126616501383.
Full textVerma, Usha, and Neelam Sharma. "Security Analysis of Medical Images using ECC over RSA." Journal of University of Shanghai for Science and Technology 23, no. 05 (July 16, 2021): 356–67. http://dx.doi.org/10.51201/jusst/21/05143.
Full textKim, Jongmin, Hyunwook Choo, and DongHwi Lee. "A Comparative Analysis on ECC(Elliptic Curve Cryptography) Operation Algorit hm for Data Protection in Video security System." Jouranl of Information and Security 19, no. 5 (December 31, 2019): 37–45. http://dx.doi.org/10.33778/kcsa.2019.19.5.037.
Full text