Several security schemes constructed using ECC-based self-certified public key cryptosystems.
Woei-Jiunn TsaurPublished in: Appl. Math. Comput. (2005)
Keyphrases
- public key cryptosystems
- elliptic curve cryptography
- elliptic curve
- modular exponentiation
- security analysis
- authentication scheme
- encryption scheme
- wireless sensor networks
- high security
- public key
- key distribution
- public key cryptography
- provably secure
- diffie hellman
- error correction
- digital watermark
- key management
- smart card
- digital signature
- security model
- resource constrained
- security requirements
- secure communication
- security properties
- fault tolerant
- energy consumption