Prominence of ECDSA over RSA digital signature algorithm

D Toradmalle, R Singh, H Shastri… - … Conference on I …, 2018 - ieeexplore.ieee.org
Digital signatures are replacing paper-based work to make life easier for customers and
employees in various industries. We rigorously use RSA and Elliptic Curve Cryptography …

[PDF][PDF] A review on elliptic curve cryptography

M Al Saadi, O Muscat, B Kumar - Int. J. Future Gener. Commun …, 2020 - researchgate.net
Cryptography has many algorithms that are used to secure the communication and make the
data exchange between the sender and receiver safe and protected from the attackers. The …

[PDF][PDF] Elliptical curve cryptography image encryption scheme with aid of optimization technique using gravitational search algorithm

R Navatejareddy, M Jayabhaskar… - Indonesian Journal of …, 2022 - academia.edu
Image encryption enables users to safely transmit digital photographs via a wireless medium
while maintaining enhanced anonymity and validity. Numerous studies are being conducted …

[PDF][PDF] Comparative analysis of MOD-ECDH algorithm and various algorithms

OS Nagesh, VS Naresh - International Journal of Industrial …, 2020 - researchgate.net
Cryptography has remained a well-known and well-researched topic for ages. It is the first
line of defense for any networked system. A lot of algorithms have been developed using …

[PDF][PDF] Elliptic Curve Implementation and its Applications: A Review

MW Abdulnabi - Iraqi Journal of Intelligent Computing and …, 2023 - researchgate.net
Encryption is regarded as essential within the safety measures used to protect data via
unsafe transport methods. Elliptic Curve encryption (ECC), one of the several asymmetric …

Design and implementation of a new encryption algorithm in MATLAB for multimedia files

R Somaiya, A Gonsai - Vidhyayana-An International …, 2021 - vidhyayanaejournal.org
Transmission of digital content has increases tremendously these days. Privacy and security
of the transmitted data has become an important concern in multimedia applications …

[PDF][PDF] Introducing pranayama to children with special needs

PE Auriane, M Ramanathan, AB Bhavanani - Advis Panel, 2019 - academia.edu
Every individual is different and unique in needs, limitations and strengths and this never
prevents anyone from practicing yoga. Children with special needs may have challenges …

Review of Lightweight Cryptography for Secure Data Transmission in Resource Constraint Environment of IoT

R Neve, R Bansode - Computing and Communications …, 2022 - taylorfrancis.com
There is tremendous growth in internet of thing from last few years. The Internet of Things
(IoT) is being used in home automation, health care, automobile industry, vehicles, defense …

EFEKTIVITAS DEEP BREATHING TERHADAP KECEMASAN IBU HAMIL DENGAN PLASENTA PREVIA: EVIDENCE BASED CASE REPORT

S Sofiyanti - Jurnal Kesehatan Siliwangi, 2022 - jurnal.polkesban.ac.id
Anxiety in pregnant women in the third trimester is caused by unpleasant emotional states.
The level of anxiety known greatly affects the welfare of pregnant women and fetuses in the …

Image Encryption the use of Elliptic-Curve Cryptography with Act Colony Optimization Algorithm

S Kaliswaran, MYM Parvees - NeuroQuantology, 2022 - search.proquest.com
Image Encryption is a wide area of research. Encryption basically deals with converting data
or information from its original form to some other form that hides the information in it. The …