Academic literature on the topic 'Elliptic Curve Diffie-Hellman Algorithm (ECDHA)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Elliptic Curve Diffie-Hellman Algorithm (ECDHA).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Elliptic Curve Diffie-Hellman Algorithm (ECDHA)"
Vamsi, Desam, and Pradeep Reddy CH. "Hybrid Image Encryption Using Elliptic Curve Cryptography, Hadamard Transform and Hill Cipher." Webology 19, no. 1 (January 20, 2022): 2357–78. http://dx.doi.org/10.14704/web/v19i1/web19160.
Full textSaepulrohman, Asep, and Teguh Puja Negara. "IMPLEMENTASI ALGORITMA TANDA TANGAN DIGITAL BERBASIS KRIPTOGRAFI KURVA ELIPTIK DIFFIE-HELLMAN." Komputasi: Jurnal Ilmiah Ilmu Komputer dan Matematika 18, no. 1 (January 26, 2021): 22–28. http://dx.doi.org/10.33751/komputasi.v18i1.2569.
Full textDi Matteo, Stefano, Luca Baldanzi, Luca Crocetti, Pietro Nannipieri, Luca Fanucci, and Sergio Saponara. "Secure Elliptic Curve Crypto-Processor for Real-Time IoT Applications." Energies 14, no. 15 (August 1, 2021): 4676. http://dx.doi.org/10.3390/en14154676.
Full textShareef, Omar Salah F., and Ali Makki Sagheer. "Improved Certificate-Based Encryption Scheme in the Big Data: Combining AES and (ECDSA – ECDH)." Ibn AL- Haitham Journal For Pure and Applied Sciences 2021 (June 1, 2021): 82–95. http://dx.doi.org/10.30526/2021.ihicpas.2655.
Full textZhu, Yuan, Yipeng Liu, Mingzhi Wu, Jinzhao Li, Shiyang Liu, and Jianning Zhao. "Research on Secure Communication on In-Vehicle Ethernet Based on Post-Quantum Algorithm NTRUEncrypt." Electronics 11, no. 6 (March 9, 2022): 856. http://dx.doi.org/10.3390/electronics11060856.
Full textP.Wagh, Dnyaneshwari, Fadewar H.S, Shinde G. N, and Santosh P. Shrikhande. "A Finger Vein Pattern based Key GenerationExchange and Security framework for IoT using ID based cryptography, ECDH and AES." International Journal of Engineering and Computer Science 11, no. 08 (August 29, 2022): 25553–63. http://dx.doi.org/10.18535/ijecs/v11i08.4695.
Full textAgrawal, Prakhar, and Arvind Upadhyay. "An Implementation of Text and Color Image Steganography Technique Using Cryptographic Algorithm." Asian Journal of Computer Science and Technology 7, no. 1 (May 5, 2018): 93–98. http://dx.doi.org/10.51983/ajcst-2018.7.1.1818.
Full textKamal, Ahmed, Esam Hagras, and H. A. El-Kamchochi. "Dynamic fractional chaotic biometric isomorphic elliptic curve for partial image encryption." Computer Science and Information Systems 18, no. 3 (2021): 1057–76. http://dx.doi.org/10.2298/csis200502018k.
Full textRiffi Boualam, Soukayna, Mariyam Ouaissa, Mariya Ouaissa, and Abdellatif Ezzouhairi. "Privacy Preservation Authentication Model for a Secure Infrastructure over Vehicular Communications." International Journal of Interactive Mobile Technologies (iJIM) 16, no. 12 (June 21, 2022): 52–71. http://dx.doi.org/10.3991/ijim.v16i12.31533.
Full textAbikoye, Oluwakemi Christiana, Esau Taiwo Oladipupo, Agbotiname Lucky Imoize, Joseph Bamidele Awotunde, Cheng-Chi Lee, and Chun-Ta Li. "Securing Critical User Information over the Internet of Medical Things Platforms Using a Hybrid Cryptography Scheme." Future Internet 15, no. 3 (February 28, 2023): 99. http://dx.doi.org/10.3390/fi15030099.
Full textDissertations / Theses on the topic "Elliptic Curve Diffie-Hellman Algorithm (ECDHA)"
Abu-Mahfouz, Adnan Mohammed. "Elliptic curve cryptosystem over optimal extension fields for computationally constrained devices." Diss., University of Pretoria, 2004. http://hdl.handle.net/2263/25330.
Full textDissertation (MEng (Computer Engineering))--University of Pretoria, 2006.
Electrical, Electronic and Computer Engineering
unrestricted
Fujdiak, Radek. "Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-358408.
Full textDas, Saptarsi. "A Polymorphic Finite Field Multiplier." Thesis, 2011. https://etd.iisc.ac.in/handle/2005/2100.
Full textDas, Saptarsi. "A Polymorphic Finite Field Multiplier." Thesis, 2011. http://hdl.handle.net/2005/2100.
Full textLin, Jhih-Yun, and 林志耘. "The Implementation of Elliptic Curve Diffie-Hellman and Elliptic Curve Digital Signature Algorithm on Altera DE2-70." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/bvjpkm.
Full text逢甲大學
資訊工程學系
103
Abstract—In recent years, Elliptic Curve Cryptography (ECC) to be attracted the attention of researcher and product developer. There are two reasons, first is having powerful mathematical structure; attackers need to know background of elliptic curve arithmetic will be easy attack. Second, for using less bit of key to reach the same safety with RSA encryption algorithm, therefore, to keep enough safety, when bit of key increase gradually, relative to RSA encryption algorithm, process time of ECC will reduce, with this characteristic, when we keep same safety in resource-constrained device, ECC will be suitable to use in the environment. This paper is based on implementation of ECC to design two safety protocols; one is Diffie–Hellman key exchange (D-H). This target of protocol is to give both communications can exchange a key in safety to provide following using encryption and decryption. The second one is digital signature algorithm (DSA) .Its purpose is to prevent non-repudiation. However digital signature can be divided into two parts, signature and verification. These two protocols are based on point arithmetic, includes point addition and point doubling. And these two point arithmetic are both from finite field arithmetic, this paper is based on GF(
Book chapters on the topic "Elliptic Curve Diffie-Hellman Algorithm (ECDHA)"
Mogollon, Manuel. "Elliptic Curve Cryptograpy." In Cryptography and Security Services, 189–216. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-837-6.ch008.
Full textSathish, A., S. Ravimaran, and S. Jerald Nirmal Kumar. "A Well-Organized Safeguarded Access on Key Propagation by Malleable Optimization in Blend With Double Permutation." In Research Anthology on Artificial Intelligence Applications in Security, 806–28. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch037.
Full textSathish, A., S. Ravimaran, and S. Jerald Nirmal Kumar. "A Well-Organized Safeguarded Access on Key Propagation by Malleable Optimization in Blend With Double Permutation." In Research Anthology on Artificial Intelligence Applications in Security, 806–28. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch037.
Full textKrishna, A. V. N. "A Randomized Cloud Library Security Environment." In Cloud Security, 1087–107. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8176-5.ch056.
Full textKrishna, A. V. N. "A Randomized Cloud Library Security Environment." In Advances in Library and Information Science, 278–96. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4631-5.ch016.
Full textConference papers on the topic "Elliptic Curve Diffie-Hellman Algorithm (ECDHA)"
Toyran, Mustafa, and Savas Berber. "Efficient implementation of elliptic curve Diffie-Hellman (ECDH) key distribution algorithm in pool-based cryptographic systems (PBCSs)." In 2010 IEEE 18th Signal Processing and Communications Applications Conference (SIU). IEEE, 2010. http://dx.doi.org/10.1109/siu.2010.5653023.
Full textZhen Cheng, Yufang Huang, and Jin Xu. "Algorithm for elliptic curve Diffie-Hellman key exchange based on DNA tile self-assembly." In 2008 3rd International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA 2008). IEEE, 2008. http://dx.doi.org/10.1109/bicta.2008.4656700.
Full textAhmedova, Oydin, Zarif Khudoykulov, Ulugbek Mardiyev, and Akbar Ortiqboyev. "Conversion of the Diffie-Hellman Key Exchange Algorithm Based on Elliptic Curve Equations to Elliptic Curve Equations with Private Parameters." In 2021 International Conference on Information Science and Communications Technologies (ICISCT). IEEE, 2021. http://dx.doi.org/10.1109/icisct52966.2021.9670074.
Full textJin, Xiyou, and Jonathan Sahagun. "Deuterium: A Secure Protocol for Group Messaging with Rotating Keys and Identity Verification." In 11th International Conference on Signal Image Processing and Multimedia. Academy and Industry Research Collaboration Center (AIRCC), 2023. http://dx.doi.org/10.5121/csit.2023.130908.
Full textReports on the topic "Elliptic Curve Diffie-Hellman Algorithm (ECDHA)"
Housley, R. Use of the Elliptic Curve Diffie-Hellman Key Agreement Algorithm with X25519 and X448 in the Cryptographic Message Syntax (CMS). RFC Editor, August 2018. http://dx.doi.org/10.17487/rfc8418.
Full text