2009 International Conference on Information and Multimedia Technology 2009
DOI: 10.1109/icimt.2009.66
|View full text |Cite
|
Sign up to set email alerts
|

A Comparative and Overview Analysis of Elliptic Curve Cryptography over Finite Fields

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…SETCTA scheme has been proposed in order to increase the protection against high-level security attacks by also considering communication and computational overhead. A general method for constructing online/offline signature schemes was introduced by the researcher Even et al [41] before few years. The proposed scheme can be very effective for the key management [30] and security using ID based authentication [28].…”
Section: Background and Motivationsmentioning
confidence: 99%
See 1 more Smart Citation
“…SETCTA scheme has been proposed in order to increase the protection against high-level security attacks by also considering communication and computational overhead. A general method for constructing online/offline signature schemes was introduced by the researcher Even et al [41] before few years. The proposed scheme can be very effective for the key management [30] and security using ID based authentication [28].…”
Section: Background and Motivationsmentioning
confidence: 99%
“…In addition, an attacker may intend to inject malicious packets in the deployed WSN and can transmit confidential information outside the network. To provide defense against all these attacks we have designed an efficient time-stamp based protocol called "SET-CTA", which is robust against insider as well as outsider attacks than other type of protocols in WSNs [41]. The characteristics of the proposed scheme mitigate the attacking risks and increase the headache of an attacker to identify and compromise important nodes present in WSNs.…”
Section: Protocol Preambles and Security Vulnerabilitiesmentioning
confidence: 99%
“…Recently elliptic curve based cryptosystems have emerged as a competing alternative to RSA. [8,11,17] …”
Section: Introductionmentioning
confidence: 99%