Academic literature on the topic 'Elliptic Curve Diffie-Hellman Algorithm (ECDHA)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Elliptic Curve Diffie-Hellman Algorithm (ECDHA).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Elliptic Curve Diffie-Hellman Algorithm (ECDHA)"
Vamsi, Desam, and Pradeep Reddy CH. "Hybrid Image Encryption Using Elliptic Curve Cryptography, Hadamard Transform and Hill Cipher." Webology 19, no. 1 (2022): 2357–78. http://dx.doi.org/10.14704/web/v19i1/web19160.
Full textSaepulrohman, Asep, and Teguh Puja Negara. "IMPLEMENTASI ALGORITMA TANDA TANGAN DIGITAL BERBASIS KRIPTOGRAFI KURVA ELIPTIK DIFFIE-HELLMAN." Komputasi: Jurnal Ilmiah Ilmu Komputer dan Matematika 18, no. 1 (2021): 22–28. http://dx.doi.org/10.33751/komputasi.v18i1.2569.
Full textDi Matteo, Stefano, Luca Baldanzi, Luca Crocetti, Pietro Nannipieri, Luca Fanucci, and Sergio Saponara. "Secure Elliptic Curve Crypto-Processor for Real-Time IoT Applications." Energies 14, no. 15 (2021): 4676. http://dx.doi.org/10.3390/en14154676.
Full textShareef, Omar Salah F., and Ali Makki Sagheer. "Improved Certificate-Based Encryption Scheme in the Big Data: Combining AES and (ECDSA – ECDH)." Ibn AL- Haitham Journal For Pure and Applied Sciences 2021 (June 1, 2021): 82–95. http://dx.doi.org/10.30526/2021.ihicpas.2655.
Full textZhu, Yuan, Yipeng Liu, Mingzhi Wu, Jinzhao Li, Shiyang Liu, and Jianning Zhao. "Research on Secure Communication on In-Vehicle Ethernet Based on Post-Quantum Algorithm NTRUEncrypt." Electronics 11, no. 6 (2022): 856. http://dx.doi.org/10.3390/electronics11060856.
Full textP.Wagh, Dnyaneshwari, Fadewar H.S, Shinde G. N, and Santosh P. Shrikhande. "A Finger Vein Pattern based Key GenerationExchange and Security framework for IoT using ID based cryptography, ECDH and AES." International Journal of Engineering and Computer Science 11, no. 08 (2022): 25553–63. http://dx.doi.org/10.18535/ijecs/v11i08.4695.
Full textAgrawal, Prakhar, and Arvind Upadhyay. "An Implementation of Text and Color Image Steganography Technique Using Cryptographic Algorithm." Asian Journal of Computer Science and Technology 7, no. 1 (2018): 93–98. http://dx.doi.org/10.51983/ajcst-2018.7.1.1818.
Full textKamal, Ahmed, Esam Hagras, and H. A. El-Kamchochi. "Dynamic fractional chaotic biometric isomorphic elliptic curve for partial image encryption." Computer Science and Information Systems 18, no. 3 (2021): 1057–76. http://dx.doi.org/10.2298/csis200502018k.
Full textRiffi Boualam, Soukayna, Mariyam Ouaissa, Mariya Ouaissa, and Abdellatif Ezzouhairi. "Privacy Preservation Authentication Model for a Secure Infrastructure over Vehicular Communications." International Journal of Interactive Mobile Technologies (iJIM) 16, no. 12 (2022): 52–71. http://dx.doi.org/10.3991/ijim.v16i12.31533.
Full textAbikoye, Oluwakemi Christiana, Esau Taiwo Oladipupo, Agbotiname Lucky Imoize, Joseph Bamidele Awotunde, Cheng-Chi Lee, and Chun-Ta Li. "Securing Critical User Information over the Internet of Medical Things Platforms Using a Hybrid Cryptography Scheme." Future Internet 15, no. 3 (2023): 99. http://dx.doi.org/10.3390/fi15030099.
Full textDissertations / Theses on the topic "Elliptic Curve Diffie-Hellman Algorithm (ECDHA)"
Abu-Mahfouz, Adnan Mohammed. "Elliptic curve cryptosystem over optimal extension fields for computationally constrained devices." Diss., University of Pretoria, 2004. http://hdl.handle.net/2263/25330.
Full textFujdiak, Radek. "Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-358408.
Full textDas, Saptarsi. "A Polymorphic Finite Field Multiplier." Thesis, 2011. https://etd.iisc.ac.in/handle/2005/2100.
Full textDas, Saptarsi. "A Polymorphic Finite Field Multiplier." Thesis, 2011. http://hdl.handle.net/2005/2100.
Full textLin, Jhih-Yun, and 林志耘. "The Implementation of Elliptic Curve Diffie-Hellman and Elliptic Curve Digital Signature Algorithm on Altera DE2-70." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/bvjpkm.
Full textBook chapters on the topic "Elliptic Curve Diffie-Hellman Algorithm (ECDHA)"
Mogollon, Manuel. "Elliptic Curve Cryptograpy." In Cryptography and Security Services. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-837-6.ch008.
Full textSathish, A., S. Ravimaran, and S. Jerald Nirmal Kumar. "A Well-Organized Safeguarded Access on Key Propagation by Malleable Optimization in Blend With Double Permutation." In Research Anthology on Artificial Intelligence Applications in Security. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch037.
Full textSathish, A., S. Ravimaran, and S. Jerald Nirmal Kumar. "A Well-Organized Safeguarded Access on Key Propagation by Malleable Optimization in Blend With Double Permutation." In Research Anthology on Artificial Intelligence Applications in Security. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch037.
Full textKrishna, A. V. N. "A Randomized Cloud Library Security Environment." In Cloud Security. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8176-5.ch056.
Full textKrishna, A. V. N. "A Randomized Cloud Library Security Environment." In Advances in Library and Information Science. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4631-5.ch016.
Full textConference papers on the topic "Elliptic Curve Diffie-Hellman Algorithm (ECDHA)"
Toyran, Mustafa, and Savas Berber. "Efficient implementation of elliptic curve Diffie-Hellman (ECDH) key distribution algorithm in pool-based cryptographic systems (PBCSs)." In 2010 IEEE 18th Signal Processing and Communications Applications Conference (SIU). IEEE, 2010. http://dx.doi.org/10.1109/siu.2010.5653023.
Full textZhen Cheng, Yufang Huang, and Jin Xu. "Algorithm for elliptic curve Diffie-Hellman key exchange based on DNA tile self-assembly." In 2008 3rd International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA 2008). IEEE, 2008. http://dx.doi.org/10.1109/bicta.2008.4656700.
Full textAhmedova, Oydin, Zarif Khudoykulov, Ulugbek Mardiyev, and Akbar Ortiqboyev. "Conversion of the Diffie-Hellman Key Exchange Algorithm Based on Elliptic Curve Equations to Elliptic Curve Equations with Private Parameters." In 2021 International Conference on Information Science and Communications Technologies (ICISCT). IEEE, 2021. http://dx.doi.org/10.1109/icisct52966.2021.9670074.
Full textJin, Xiyou, and Jonathan Sahagun. "Deuterium: A Secure Protocol for Group Messaging with Rotating Keys and Identity Verification." In 11th International Conference on Signal Image Processing and Multimedia. Academy and Industry Research Collaboration Center (AIRCC), 2023. http://dx.doi.org/10.5121/csit.2023.130908.
Full textReports on the topic "Elliptic Curve Diffie-Hellman Algorithm (ECDHA)"
Housley, R. Use of the Elliptic Curve Diffie-Hellman Key Agreement Algorithm with X25519 and X448 in the Cryptographic Message Syntax (CMS). RFC Editor, 2018. http://dx.doi.org/10.17487/rfc8418.
Full text