Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Using Elliptic Curve Cryptography (ECC)
暂无分享,去创建一个
[1] Hung-I Hsiao,et al. Fingerprint image cryptography based on multiple chaotic systems , 2015, Signal Process..
[2] Himanshu Gupta,et al. Anti-Phishing Techniques in Cryptography , 2015 .
[3] L. Malik,et al. Comparative Analysis of Authenticated Key Agreement Protocols Based on Elliptic Curve Cryptography , 2016 .
[4] Sirapat Boonkrong,et al. Finding the Optimal Value for Threshold Cryptography on Cloud Computing , 2016 .
[5] Lidia Ogiela,et al. Cryptographic techniques of strategic data splitting and secure information management , 2016, Pervasive Mob. Comput..
[6] A. Rama Krishna,et al. A Hybrid Cryptographic System for Secured Device to Device Communication , 2016 .
[7] Altaf O. Mulani,et al. Watermarking and Cryptography Based Image Authentication on Reconfigurable Platform , 2017 .
[8] V. R. Josna,et al. CASH on Modified Elgamal: A Preventive Technique for False Channel Condition Reporting Attackin Ad-hoc Network , 2016 .
[9] Kalinka Regina Lucas Jaquie Castelo Branco,et al. Case studies of performance evaluation of cryptographic algorithms for an embedded system and a general purpose computer , 2016, J. Netw. Comput. Appl..
[10] Henry Dalziel. Chapter 9 – Cryptography , 2015 .
[11] Arslan Munir,et al. Evolving side-channel resistant reconfigurable hardware for elliptic curve cryptography , 2017, 2017 IEEE Congress on Evolutionary Computation (CEC).
[12] G. Sridevi,et al. Hybrid Cryptography for Random-key Generation based on ECC Algorithm , 2017 .
[13] Siddhartha Bhattacharyya,et al. Content Based Double Encryption Algorithm Using Symmetric Key Cryptography , 2015 .
[14] Khumanthem Manglem Singh,et al. Implementation of Text Encryption using Elliptic Curve Cryptography , 2015 .
[16] Manish Ranjan,et al. A Cloud Based Secure Voting System using Homomorphic Encryption for Android Platform , 2016 .
[17] 刘雪梅,et al. Cryptanalysis and security enhancement of optical cryptography based on computational ghost imaging , 2015 .
[18] Musheer Ahmad,et al. Efficient Cryptographic Substitution Box Design Using Travelling Salesman Problem and Chaos , 2017, ArXiv.
[19] Xiaofeng Liao,et al. Color image encryption based on chaotic systems and elliptic curve ElGamal scheme , 2017, Signal Process..
[20] Priyadarshini Patila,et al. A Comprehensive Evaluation of Cryptographic Algorithms : DES , 3 DES , AES , RSA and Blowfish , 2016 .
[21] Mike Scott,et al. High performance hardware support for elliptic curve cryptography over general prime field , 2017, Microprocess. Microsystems.
[22] S. Gajbhiye,et al. A Survey Report On Elliptic Curve Cryptography , 2011 .