Security and Performance of Elliptic Curve Cryptography in Resource-limited Environments: A Comparative Study.
Ali RayaK. MariyappnPublished in: ICITST (2020)
Keyphrases
- elliptic curve cryptography
- resource limited
- elliptic curve
- security analysis
- public key
- cryptographic algorithms
- high security
- authentication scheme
- public key cryptography
- embedded systems
- error correction
- digital watermark
- public key cryptosystems
- security model
- secret key
- encryption algorithm
- intrusion detection
- smart card
- diffie hellman
- image encryption
- authentication protocol
- information security