Proposed Approach for Key Generation Based on Elliptic Curve (EC) Algebra and Metaheuristic Algorithms
The key management is an important area of research in internet applications, because protecting secret messages during transmission becomes an essential issue for the Internet. Elliptic Curve Cryptography (ECC) has attracted the attention of researchers and product developers due to its robust math...
Main Authors: | Hala Bahjat Abdul Wahab, Suhad Malallah Kadhem, Estabraq Abdul Redaa Kadhim |
---|---|
Format: | Article |
Language: | English |
Published: |
Unviversity of Technology- Iraq
2014-01-01
|
Series: | Engineering and Technology Journal |
Subjects: | |
Online Access: | https://etj.uotechnology.edu.iq/article_102335_87f911252e04148f60a2506d118630bf.pdf |
Similar Items
-
Integrating Elliptic Curve Cryptography with the Modbus TCP SCADA Communication Protocol
by: Despoina Chochtoula, et al.
Published: (2022-07-01) -
Elliptic Curve Signcryption-Based Mutual Authentication Protocol for Smart Cards
by: Anuj Kumar Singh, et al.
Published: (2020-11-01) -
Methods for using elliptic curves in cryptography
by: Obukhov Vadim, et al.
Published: (2024-01-01) -
Automated Correctness Proof of Algorithm Variants in Elliptic Curve Cryptography
by: M. . Anikeev, et al.
Published: (2010-12-01) -
On the Improvement of Addition Chain in Applications to Elliptic Curve Cryptosystem
Status: Submitted
by: Mohamed, Mohamad Afendee
Published: (2011)