2016
DOI: 10.1016/j.procs.2016.02.065
|View full text |Cite
|
Sign up to set email alerts
|

Comparative Analysis of Authenticated Key Agreement Protocols Based on Elliptic Curve Cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 29 publications
0
5
0
Order By: Relevance
“…In this paper, we have made use of the encryption algorithms and implemented them both classical and quantum environments. Cryptographic algorithms such as, Blowfish, an algorithm which is a symmetric block cipher that can be used as a drop-in replacement for DES (Data Encryption Standard) or IDEA (International Data Encryption Algorithm) [1], RSA, an asymmetric algorithm that is the encryption and decryption procedure are done with two different keys -public key and private key, and the private key cannot be derived from the public key, that enables the publication of the encryption key without the risk of leaking the secrets [2], and ECC, another asymmetric cryptographic algorithms that is similar to RSA but uses elliptical curves which is built upon algebraic structure of elliptic curve over finite fields [3] are used. Using these two computational methods enables us to derive a broader perspective on cryptography algorithms and how they work on quantum computers.…”
Section: Introductionmentioning
confidence: 99%
“…In this paper, we have made use of the encryption algorithms and implemented them both classical and quantum environments. Cryptographic algorithms such as, Blowfish, an algorithm which is a symmetric block cipher that can be used as a drop-in replacement for DES (Data Encryption Standard) or IDEA (International Data Encryption Algorithm) [1], RSA, an asymmetric algorithm that is the encryption and decryption procedure are done with two different keys -public key and private key, and the private key cannot be derived from the public key, that enables the publication of the encryption key without the risk of leaking the secrets [2], and ECC, another asymmetric cryptographic algorithms that is similar to RSA but uses elliptical curves which is built upon algebraic structure of elliptic curve over finite fields [3] are used. Using these two computational methods enables us to derive a broader perspective on cryptography algorithms and how they work on quantum computers.…”
Section: Introductionmentioning
confidence: 99%
“…Laurent et al [4] stated about various digital techniques. Nimbhorkar and Malik [5] discussed only about key agreement protocol using ECC. Leaning [6] elaborated having physical access to an internet enabled system.…”
Section: Maintaining the Integrity Of The Specificationsmentioning
confidence: 99%
“…Kim (1997) given process for Discrete Logarithms [4]. Sun (1999) given method for Discrete Logarithms [5]. Hwang (2003) given procedure for RSA and Lagrange Coefficient [6].…”
Section: History Of Various Proxy Signature Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“…Then determine the elliptic group element E19 (1,1) which is the settlement of the equation y2=x3+x+1 (mod 19), for x ∈ F19 and y2 ∈ QR19. Here are the steps to find elements of elliptic curve groups or dots on the elliptic curve based of elliptic curve equations that have been formed: [23] a. Set x from 0 to p -1, for this matter means x={0, 1,. .…”
Section: Ecc Procedures Phase 1: Determining the Main Points Of Elliptic Curvementioning
confidence: 99%