Implementation of text based cryptosystem using elliptic curve cryptography

SMC Vigila, K Muneeswaran - 2009 First international …, 2009 - ieeexplore.ieee.org
Data encryption is widely used to ensure security in open networks such as the internet. With
the fast development of cryptography research and computer technology, the capabilities of …

Enhancing security in text messages using matrix based mapping and ElGamal method in elliptic curve cryptography

R Balamurugan, V Kamalakannan… - … and Informatics (IC3I …, 2014 - ieeexplore.ieee.org
Industries attention is lots more on Elliptic Curve Cryptography (ECC). ECC offers equal
security for smaller bit size than RSA where larger key size is required, which reduces the …

[PDF][PDF] Knapsack based ECC encryption and decryption.

RR Ramasamy, MA Prabakar, MI Devi… - Int. J. Netw …, 2009 - ijns.jalaxy.com.tw
Abstract Elliptic Curve Cryptography provides a secure means of exchanging keys among
communicating hosts using the Diffie Hellman Key Exchange algorithm. Encryption and …

[PDF][PDF] Nonce Based Elliptic Curve Cryptosystem for Text and Image Applications.

SMC Vigila, K Muneeswaran - Int. J. Netw. Secur., 2012 - Citeseer
With the explosion of networks and the huge amount of data transmitted along, securing
data content is becoming more and more important. Data encryption is widely used to …

[PDF][PDF] Hardware Implementation of Efficient Modified Karatsuba Multiplier Used in Elliptic Curves.

SM Shohdy, A El-Sisi, NA Ismail - Int. J. Netw. Secur., 2010 - Citeseer
The efficiency of the core Galois field arithmetic improves the performance of elliptic curve
based public key cryptosystem implementation. This paper describes the design and …

[PDF][PDF] Window method based cubic spline curve public key cryptography

AVN Krishna, AH Narayana… - International Journal of …, 2016 - ijeie.jalaxy.com.tw
In this work, a cubic spline curve is considered for Asymmetric mode encrypting data. A
steady state, one dimensional equation is integrated over a control volume. The derivatives …

Efficient ECC scalar multiplication algorithm based on symmetric ternary in wireless sensor networks

H Liu, Q Dong, Y Li - 2017 Progress in Electromagnetics …, 2017 - ieeexplore.ieee.org
With the rapid development of communication technology, wireless sensor networks have
been widely used in several fields ranging from environmental monitoring and medical care …

An efficient elliptic curves scalar multiplication for wireless network

B Wang, H Zhang, Y Wang - 2007 IFIP International Conference …, 2007 - ieeexplore.ieee.org
Mobile and wireless devices like cell phones and network enhanced PDAs have become
increasingly popular in recent years. The security of data transmitted via these devices has …

[PDF][PDF] Image encryption and decryption using elliptic curve cryptography

PN Astya, B Singh, D Chauhan - proceedings oN IJARSE, 2014 - Citeseer
In today's world image plays an important role in everyone's life. The, security of image is
required while transferring them across the network. Various encryption and decryption …

A new elliptic curve cryptosystem for securing sensitive data applications

SMC Vigila, K Muneeswaran - International Journal of …, 2013 - inderscienceonline.com
Enhancing security is the main intention for public key cryptosystems on the basis of the
hardness of the obstinate computational problems. In this paper, the ASCII value depiction of …