2012
DOI: 10.5121/ijdps.2012.3125
|View full text |Cite
|
Sign up to set email alerts
|

Encryption Of Data Using Elliptic Curve Over Finite Fields

Abstract: Cryptography is the study of techniques for ensuring the secrecy and authentication of the information. Public -key encryption schemes are secure only if the authenticity of the public-key is assured. Elliptic curve arithmetic can be used to develop a variety of elliptic curve cryptographic (ECC) schemes including key exchange, encryption and digital signature. The principal attraction of elliptic curve cryptography compared to RSA is that it offers equal security for a smaller key-size, thereby reducing the p… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(8 citation statements)
references
References 13 publications
(22 reference statements)
0
8
0
Order By: Relevance
“…In [20,21], the communicating parties agree on a table where each character is associated with a distinct point on the curve. Utilizing this table, the sender encrypts points that correspond to message characters.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [20,21], the communicating parties agree on a table where each character is associated with a distinct point on the curve. Utilizing this table, the sender encrypts points that correspond to message characters.…”
Section: Related Workmentioning
confidence: 99%
“…Once the receiver decrypts the cipher, they can retrieve the original message using the same table. Although [21] employs ElGamal-v1, and [20] utilizes a modified version of ElGamal-v1, both approaches exhibit high complexity and bandwidth usage.…”
Section: Related Workmentioning
confidence: 99%
“…Basically, it means talking to your computer, and having it correctly recognized what you are saying. Voice or speech recognition [7] is the ability of a machine or program to receive and interpret dictation, or to understand and carry out spoken commands.…”
Section: Generating Cryptographic Keys: -Voice Recognitionmentioning
confidence: 99%
“…Mathematically, sound is represented as a sequence of values, forming a temporal series. There are several techniques to extract features of time series and analyze the original sound waveform, without needing to individually analyze each point of the time series [6][7]. The result of a biometric measurement of the voice is totally dependant on [8][9][10][11]:…”
Section: Introductionmentioning
confidence: 99%
“…According to [10], [11] gave mapping methods and blind digital image watermarking using Hénon chaotic map on ECC. ECC also applies parallel encryption, multi-point encryption at the same time [12], with researching [13] is using fuzzy set to evaluate the security on ECC. According to [8] based on elliptic curve cryptography to analysis of a secure communication for healthcare system using wearable devices.…”
Section: Introductionmentioning
confidence: 99%