Implementation of text based cryptosystem using elliptic curve cryptography
SMC Vigila, K Muneeswaran - 2009 First international …, 2009 - ieeexplore.ieee.org
Data encryption is widely used to ensure security in open networks such as the internet. With
the fast development of cryptography research and computer technology, the capabilities of …
the fast development of cryptography research and computer technology, the capabilities of …
Enhancing security in text messages using matrix based mapping and ElGamal method in elliptic curve cryptography
R Balamurugan, V Kamalakannan… - … and Informatics (IC3I …, 2014 - ieeexplore.ieee.org
Industries attention is lots more on Elliptic Curve Cryptography (ECC). ECC offers equal
security for smaller bit size than RSA where larger key size is required, which reduces the …
security for smaller bit size than RSA where larger key size is required, which reduces the …
[PDF][PDF] Knapsack based ECC encryption and decryption.
RR Ramasamy, MA Prabakar, MI Devi… - Int. J. Netw …, 2009 - ijns.jalaxy.com.tw
Abstract Elliptic Curve Cryptography provides a secure means of exchanging keys among
communicating hosts using the Diffie Hellman Key Exchange algorithm. Encryption and …
communicating hosts using the Diffie Hellman Key Exchange algorithm. Encryption and …
[PDF][PDF] Nonce Based Elliptic Curve Cryptosystem for Text and Image Applications.
SMC Vigila, K Muneeswaran - Int. J. Netw. Secur., 2012 - Citeseer
With the explosion of networks and the huge amount of data transmitted along, securing
data content is becoming more and more important. Data encryption is widely used to …
data content is becoming more and more important. Data encryption is widely used to …
[PDF][PDF] Hardware Implementation of Efficient Modified Karatsuba Multiplier Used in Elliptic Curves.
The efficiency of the core Galois field arithmetic improves the performance of elliptic curve
based public key cryptosystem implementation. This paper describes the design and …
based public key cryptosystem implementation. This paper describes the design and …
[PDF][PDF] Window method based cubic spline curve public key cryptography
AVN Krishna, AH Narayana… - International Journal of …, 2016 - ijeie.jalaxy.com.tw
In this work, a cubic spline curve is considered for Asymmetric mode encrypting data. A
steady state, one dimensional equation is integrated over a control volume. The derivatives …
steady state, one dimensional equation is integrated over a control volume. The derivatives …
Efficient ECC scalar multiplication algorithm based on symmetric ternary in wireless sensor networks
H Liu, Q Dong, Y Li - 2017 Progress in Electromagnetics …, 2017 - ieeexplore.ieee.org
With the rapid development of communication technology, wireless sensor networks have
been widely used in several fields ranging from environmental monitoring and medical care …
been widely used in several fields ranging from environmental monitoring and medical care …
An efficient elliptic curves scalar multiplication for wireless network
B Wang, H Zhang, Y Wang - 2007 IFIP International Conference …, 2007 - ieeexplore.ieee.org
Mobile and wireless devices like cell phones and network enhanced PDAs have become
increasingly popular in recent years. The security of data transmitted via these devices has …
increasingly popular in recent years. The security of data transmitted via these devices has …
[PDF][PDF] Image encryption and decryption using elliptic curve cryptography
PN Astya, B Singh, D Chauhan - proceedings oN IJARSE, 2014 - Citeseer
In today's world image plays an important role in everyone's life. The, security of image is
required while transferring them across the network. Various encryption and decryption …
required while transferring them across the network. Various encryption and decryption …
A new elliptic curve cryptosystem for securing sensitive data applications
SMC Vigila, K Muneeswaran - International Journal of …, 2013 - inderscienceonline.com
Enhancing security is the main intention for public key cryptosystems on the basis of the
hardness of the obstinate computational problems. In this paper, the ASCII value depiction of …
hardness of the obstinate computational problems. In this paper, the ASCII value depiction of …