2020 5th International Conference on Devices, Circuits and Systems (ICDCS) 2020
DOI: 10.1109/icdcs48716.2020.243562
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of Elliptic Curve Cryptography over a Server-Clie|nt network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 9 publications
0
1
0
Order By: Relevance
“…Radio-frequency identification networks (RFID) [9], [10], [11], internet-of-things (IoTs) [12], [13], [14], [15] and wireless sensor nodes (WSNs) [16] are typical examples of area-constrained cryptographic applications that demand low complexity H/W realization of the ECC's PM computation. Instead of these applications, other related applications are error correction codes [17], digital signal processors [18], network servers [19], etc.…”
Section: Introductionmentioning
confidence: 99%
“…Radio-frequency identification networks (RFID) [9], [10], [11], internet-of-things (IoTs) [12], [13], [14], [15] and wireless sensor nodes (WSNs) [16] are typical examples of area-constrained cryptographic applications that demand low complexity H/W realization of the ECC's PM computation. Instead of these applications, other related applications are error correction codes [17], digital signal processors [18], network servers [19], etc.…”
Section: Introductionmentioning
confidence: 99%