Journal articles on the topic 'Elliptic Curve Diffie-Hellman Algorithm (ECDHA)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Elliptic Curve Diffie-Hellman Algorithm (ECDHA).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Vamsi, Desam, and Pradeep Reddy CH. "Hybrid Image Encryption Using Elliptic Curve Cryptography, Hadamard Transform and Hill Cipher." Webology 19, no. 1 (January 20, 2022): 2357–78. http://dx.doi.org/10.14704/web/v19i1/web19160.
Full textSaepulrohman, Asep, and Teguh Puja Negara. "IMPLEMENTASI ALGORITMA TANDA TANGAN DIGITAL BERBASIS KRIPTOGRAFI KURVA ELIPTIK DIFFIE-HELLMAN." Komputasi: Jurnal Ilmiah Ilmu Komputer dan Matematika 18, no. 1 (January 26, 2021): 22–28. http://dx.doi.org/10.33751/komputasi.v18i1.2569.
Full textDi Matteo, Stefano, Luca Baldanzi, Luca Crocetti, Pietro Nannipieri, Luca Fanucci, and Sergio Saponara. "Secure Elliptic Curve Crypto-Processor for Real-Time IoT Applications." Energies 14, no. 15 (August 1, 2021): 4676. http://dx.doi.org/10.3390/en14154676.
Full textShareef, Omar Salah F., and Ali Makki Sagheer. "Improved Certificate-Based Encryption Scheme in the Big Data: Combining AES and (ECDSA – ECDH)." Ibn AL- Haitham Journal For Pure and Applied Sciences 2021 (June 1, 2021): 82–95. http://dx.doi.org/10.30526/2021.ihicpas.2655.
Full textZhu, Yuan, Yipeng Liu, Mingzhi Wu, Jinzhao Li, Shiyang Liu, and Jianning Zhao. "Research on Secure Communication on In-Vehicle Ethernet Based on Post-Quantum Algorithm NTRUEncrypt." Electronics 11, no. 6 (March 9, 2022): 856. http://dx.doi.org/10.3390/electronics11060856.
Full textP.Wagh, Dnyaneshwari, Fadewar H.S, Shinde G. N, and Santosh P. Shrikhande. "A Finger Vein Pattern based Key GenerationExchange and Security framework for IoT using ID based cryptography, ECDH and AES." International Journal of Engineering and Computer Science 11, no. 08 (August 29, 2022): 25553–63. http://dx.doi.org/10.18535/ijecs/v11i08.4695.
Full textAgrawal, Prakhar, and Arvind Upadhyay. "An Implementation of Text and Color Image Steganography Technique Using Cryptographic Algorithm." Asian Journal of Computer Science and Technology 7, no. 1 (May 5, 2018): 93–98. http://dx.doi.org/10.51983/ajcst-2018.7.1.1818.
Full textKamal, Ahmed, Esam Hagras, and H. A. El-Kamchochi. "Dynamic fractional chaotic biometric isomorphic elliptic curve for partial image encryption." Computer Science and Information Systems 18, no. 3 (2021): 1057–76. http://dx.doi.org/10.2298/csis200502018k.
Full textRiffi Boualam, Soukayna, Mariyam Ouaissa, Mariya Ouaissa, and Abdellatif Ezzouhairi. "Privacy Preservation Authentication Model for a Secure Infrastructure over Vehicular Communications." International Journal of Interactive Mobile Technologies (iJIM) 16, no. 12 (June 21, 2022): 52–71. http://dx.doi.org/10.3991/ijim.v16i12.31533.
Full textAbikoye, Oluwakemi Christiana, Esau Taiwo Oladipupo, Agbotiname Lucky Imoize, Joseph Bamidele Awotunde, Cheng-Chi Lee, and Chun-Ta Li. "Securing Critical User Information over the Internet of Medical Things Platforms Using a Hybrid Cryptography Scheme." Future Internet 15, no. 3 (February 28, 2023): 99. http://dx.doi.org/10.3390/fi15030099.
Full textAhmad, Ashraf, Yousef AbuHour, Remah Younisse, Yasmeen Alslman, Eman Alnagi, and Qasem Abu Al-Haija. "MID-Crypt: A Cryptographic Algorithm for Advanced Medical Images Protection." Journal of Sensor and Actuator Networks 11, no. 2 (May 13, 2022): 24. http://dx.doi.org/10.3390/jsan11020024.
Full textBandung, Yoanes, and Arvandy Arvandy. "Development of Authenticated Key Exchange Protocol for IoT Sensor Layer." International Journal on Electrical Engineering and Informatics 12, no. 3 (September 30, 2020): 607–23. http://dx.doi.org/10.15676/ijeei.2020.12.3.11.
Full textDar, Muneer Ahmad, Aadil Askar, Daliya Alyahya, and Sameer Ahmad Bhat. "Lightweight and Secure Elliptical Curve Cryptography (ECC) Key Exchange for Mobile Phones." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 23 (December 8, 2021): 89–103. http://dx.doi.org/10.3991/ijim.v15i23.26337.
Full textAbood, Basim, Abeer Naser Faisal, and Qasim Abduljabbar Hamed. "Data transmitted encryption for clustering protocol in heterogeneous wireless sensor networks." Indonesian Journal of Electrical Engineering and Computer Science 25, no. 1 (January 1, 2022): 347. http://dx.doi.org/10.11591/ijeecs.v25.i1.pp347-357.
Full textAhmed, Adel A., and Omar M. Barukab. "Unforgeable Digital Signature Integrated into Lightweight Encryption Based on Effective ECDH for Cybersecurity Mechanism in Internet of Things." Processes 10, no. 12 (December 7, 2022): 2631. http://dx.doi.org/10.3390/pr10122631.
Full textAli, Waleed, and Adel Ali Ahmed. "An Authenticated Group Shared Key Mechanism Based on a Combiner for Hash Functions over the Industrial Internet of Things." Processes 11, no. 5 (May 19, 2023): 1558. http://dx.doi.org/10.3390/pr11051558.
Full textSethuraman, Priya, P. S. Tamizharasan, and Kannan Arputharaj. "Fuzzy Genetic Elliptic Curve Diffie Hellman Algorithm for Secured Communication in Networks." Wireless Personal Communications 105, no. 3 (February 6, 2019): 993–1007. http://dx.doi.org/10.1007/s11277-019-06132-4.
Full textSundararajan, Ananiah Durai Durai, and Rajashree R. "A Comprehensive Survey on Lightweight Asymmetric Key Cryptographic Algorithm for Resource Constrained Devices." ECS Transactions 107, no. 1 (April 24, 2022): 7457–68. http://dx.doi.org/10.1149/10701.7457ecst.
Full textBashir, Zia, M. G. Abbas Malik, Muhammad Hussain, and Nadeem Iqbal. "Multiple RGB images encryption algorithm based on elliptic curve, improved Diffie Hellman protocol." Multimedia Tools and Applications 81, no. 3 (November 24, 2021): 3867–97. http://dx.doi.org/10.1007/s11042-021-11687-1.
Full textThapar, Prateek, and Usha Batra. "Implementation of Elliptical Curve Cryptography Based Diffie-Hellman Key Exchange Mechanism in Contiki Operating System for Internet of Things." International Journal of Electrical and Electronics Research 10, no. 2 (June 30, 2022): 335–40. http://dx.doi.org/10.37391/ijeer.100245.
Full textB.V.Satya Vara Prasad, B., Ch Hari Kishan, S. P. Praveen, and Ch Mani Teja. "Identity-Based Data integrity checking in public cloud with bilinear pairings." International Journal of Engineering & Technology 7, no. 2.7 (March 18, 2018): 209. http://dx.doi.org/10.14419/ijet.v7i2.7.10294.
Full textMorales-Sandoval, Miguel, Luis Armando Rodriguez Flores, Rene Cumplido, Jose Juan Garcia-Hernandez, Claudia Feregrino, and Ignacio Algredo. "A Compact FPGA-Based Accelerator for Curve-Based Cryptography in Wireless Sensor Networks." Journal of Sensors 2021 (January 6, 2021): 1–13. http://dx.doi.org/10.1155/2021/8860413.
Full textKirlar, Bariş Bülent. "Efficient message transmission via twisted Edwards curves." Mathematica Slovaca 70, no. 6 (December 16, 2020): 1511–20. http://dx.doi.org/10.1515/ms-2017-0444.
Full textPatil, Anitha. "Enhanced-Elliptic Curve Diffie Hellman Algorithm for Secure Data Storage in Multi Cloud Environment." International Journal of Intelligent Engineering and Systems 11, no. 2 (April 30, 2018): 184–91. http://dx.doi.org/10.22266/ijies2018.0430.20.
Full textCheng, Zhen, Yufang Huang, Zhihua Chen, Xiaolong Shi, and Jin Xu. "Algorithm for Elliptic Curve Diffie-Hellman Key Exchange Based on DNA Tile Self-Assembly." Journal of Computational and Theoretical Nanoscience 7, no. 5 (May 1, 2010): 856–61. http://dx.doi.org/10.1166/jctn.2010.1431.
Full textYann Cedric Lawson, Teyi, and Senthilnathan T. "Effectiveness of the NIZKP Protocol for Authentication in IoT Environment." International Journal of Engineering & Technology 7, no. 2.6 (March 11, 2018): 231. http://dx.doi.org/10.14419/ijet.v7i2.6.10775.
Full textSaputro, Triyas Hevianto, Nur Hidayati Hidayati, and Erik Iman H. Ujianto. "SURVEI TENTANG ALGORITMA KRIPTOGRAFI ASIMETRIS." Jurnal Informatika Polinema 6, no. 2 (March 8, 2020): 67–72. http://dx.doi.org/10.33795/jip.v6i2.345.
Full textTadesse, Abiy, Yalemzewd Negash, and P. G. V. Suresh Kumar. "Compact and High Speed Point Multiplication Architecture for Elliptic Curve Diffie-Hellman Algorithm on Reconfigurable Computing." International Journal of Computing and Digital Systems 11, no. 1 (March 31, 2022): 1275–88. http://dx.doi.org/10.12785/ijcds/1101103.
Full textKumar, Manish, Akhlad Iqbal, and Pranjal Kumar. "A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie–Hellman cryptography." Signal Processing 125 (August 2016): 187–202. http://dx.doi.org/10.1016/j.sigpro.2016.01.017.
Full textTom, Dr Joshua J., Dr Nlerum P. Anebo, Dr Bukola A. Onyekwelu, Adigwe Wilfred, and Richard E. Eyo. "Quantum Computers and Algorithms: A Threat to Classical Cryptographic Systems." International Journal of Engineering and Advanced Technology 12, no. 5 (June 30, 2023): 25–38. http://dx.doi.org/10.35940/ijeat.e4153.0612523.
Full textAhmed, Adel A., Sharaf J. Malebary, Waleed Ali, and Ahmed A. Alzahrani. "A Provable Secure Cybersecurity Mechanism Based on Combination of Lightweight Cryptography and Authentication for Internet of Things." Mathematics 11, no. 1 (January 1, 2023): 220. http://dx.doi.org/10.3390/math11010220.
Full textAl-Zubaidie, Mishall. "Implication of Lightweight and Robust Hash Function to Support Key Exchange in Health Sensor Networks." Symmetry 15, no. 1 (January 4, 2023): 152. http://dx.doi.org/10.3390/sym15010152.
Full textHagras, Esam A. A., Saad Aldosary, Haitham Khaled, and Tarek M. Hassan. "Authenticated Public Key Elliptic Curve Based on Deep Convolutional Neural Network for Cybersecurity Image Encryption Application." Sensors 23, no. 14 (July 21, 2023): 6589. http://dx.doi.org/10.3390/s23146589.
Full textArepalli, Gopi, and Suresh Babu Erukula. "Secure Multicast Routing Protocol in Manets Using Efficient ECGDH Algorithm." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 4 (August 1, 2016): 1857. http://dx.doi.org/10.11591/ijece.v6i4.9941.
Full textArepalli, Gopi, and Suresh Babu Erukula. "Secure Multicast Routing Protocol in Manets Using Efficient ECGDH Algorithm." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 4 (August 1, 2016): 1857. http://dx.doi.org/10.11591/ijece.v6i4.pp1857-1865.
Full textCoruh, Uğur, and Oğuz Bayat. "Hybrid Secure Authentication and Key Exchange Scheme for M2M Home Networks." Security and Communication Networks 2018 (November 1, 2018): 1–25. http://dx.doi.org/10.1155/2018/6563089.
Full textAltmemi, Dhuha Kh, and Basim Sahar Yaseen. "A new method based on swarm intelligence with encrypted data in wireless sensor networks." Indonesian Journal of Electrical Engineering and Computer Science 30, no. 3 (June 1, 2023): 1525. http://dx.doi.org/10.11591/ijeecs.v30.i3.pp1525-1533.
Full textAlesawy, Othman, and Ravie Chandren Muniyandi. "Elliptic Curve Diffie-Hellman Random Keys Using Artificial Neural Network and Genetic Algorithm for Secure Data over Private Cloud." Information Technology Journal 15, no. 3 (June 15, 2016): 77–83. http://dx.doi.org/10.3923/itj.2016.77.83.
Full textThompson, Aderonke F., Oghenerukevwe E. Oyinloye, Matthew T. David, and Boniface K. Alese. "A Secured System for Internet Enabled Host Devices." Network and Communication Technologies 5, no. 1 (February 6, 2020): 26. http://dx.doi.org/10.5539/nct.v5n1p26.
Full textZhou, Caixue, Zhiqiang Zhao, Wan Zhou, and Yuan Mei. "Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings." Security and Communication Networks 2017 (2017): 1–17. http://dx.doi.org/10.1155/2017/8405879.
Full textSathish, A., S. Ravimaran, and S. Jerald Nirmal Kumar. "A Well-Organized Safeguarded Access on Key Propagation by Malleable Optimization in Blend With Double Permutation." International Journal of Web Services Research 17, no. 1 (January 2020): 43–63. http://dx.doi.org/10.4018/ijwsr.2020010103.
Full textSulaiman, Yousif Hardan, Sami Abduljabbar Rashid, Mustafa Maad Hamdi, Zaid Omar Abdulrahman Faiyadh, Abdulrahman Sabah Jaafar Sadiq, and Ahmed Jamal Ahmed. "Hybrid security in AOMDV routing protocol with improved salp swarm algorithm in wireless sensor network." Bulletin of Electrical Engineering and Informatics 11, no. 5 (October 1, 2022): 2866–75. http://dx.doi.org/10.11591/eei.v11i5.3696.
Full textCui, Beibei, Lu Wei, and Wei He. "A New Certificateless Signcryption Scheme for Securing Internet of Vehicles in the 5G Era." Security and Communication Networks 2022 (September 19, 2022): 1–10. http://dx.doi.org/10.1155/2022/3214913.
Full textKanda, Guard, and Kwangki Ryoo. "Design of an Integrated Cryptographic SoC Architecture for Resource-Constrained Devices." International Journal of Electrical and Electronics Research 10, no. 2 (June 30, 2022): 230–44. http://dx.doi.org/10.37391/ijeer.100231.
Full textZhou, Caixue. "An improved lightweight certificateless generalized signcryption scheme for mobile-health system." International Journal of Distributed Sensor Networks 15, no. 1 (January 2019): 155014771882446. http://dx.doi.org/10.1177/1550147718824465.
Full textNayyar, Anand, Rudra Rameshwar, and Piyush Kanti Dutta. "Special Issue on Recent Trends and Future of Fog and Edge Computing, Services and Enabling Technologies." Scalable Computing: Practice and Experience 20, no. 2 (May 2, 2019): iii—vi. http://dx.doi.org/10.12694/scpe.v20i2.1558.
Full textOudah, Mohammed Sh, and Abeer T. Maolood. "IoT-Key Agreement Protocol Based on The Lowest Work-Load Versions of The Elliptic Curve Diffie-Hellman." Iraqi Journal of Science, August 30, 2023, 4198–207. http://dx.doi.org/10.24996/ijs.2023.64.8.39.
Full text"A Systematic Dynamic Key Agreement Mechanism for LTE Advanced Networks in the Internet of Things." International Journal of Innovative Technology and Exploring Engineering 9, no. 2S3 (December 30, 2019): 302–7. http://dx.doi.org/10.35940/ijitee.b1031.1292s319.
Full text"A Visual Cryptographic Technique for Transferring Secret Image in Public Cloud." International Journal of Innovative Technology and Exploring Engineering 9, no. 3 (January 10, 2020): 2257–60. http://dx.doi.org/10.35940/ijitee.c9037.019320.
Full textMohana, P. V. Ananda. "Post–Quantum Cryptography – A Primer." Advanced Computing and Communications, March 31, 2020. http://dx.doi.org/10.34048/acc.2020.1.f2.
Full text