Loading [MathJax]/extensions/MathMenu.js
Elliptic Curve Cryptography in Constrained Environments: A Review | IEEE Conference Publication | IEEE Xplore

Elliptic Curve Cryptography in Constrained Environments: A Review


Abstract:

In order to provide security in constrained environments, Public Key cryptography is being used extensively. Elliptic Curve Cryptography (ECC) is one of the best Public K...Show More

Abstract:

In order to provide security in constrained environments, Public Key cryptography is being used extensively. Elliptic Curve Cryptography (ECC) is one of the best Public Key encryption techniques. ECC uses smaller key sizes compared to traditionally used RSA based cryptosystems for nearly the same security status. ECC offers great potential for the future research due to the ever growing demand for compaction of the devices and load balancing for environments where there are memory, bandwidth and computational constrains.
Date of Conference: 03-05 June 2011
Date Added to IEEE Xplore: 28 July 2011
ISBN Information:
Conference Location: Katra, India

References

References is not available for this document.