Loading [MathJax]/extensions/MathMenu.js
Elliptic Curve Cryptography and its applications | IEEE Conference Publication | IEEE Xplore

Elliptic Curve Cryptography and its applications


Abstract:

The idea of Elliptic Curve Cryptography (ECC), and how it's a better promise for a faster and more secure method of encryption in comparison to the current standards in t...Show More

Abstract:

The idea of Elliptic Curve Cryptography (ECC), and how it's a better promise for a faster and more secure method of encryption in comparison to the current standards in the Public-Key Cryptographic algorithms of RSA is discussed in this paper. The Elliptic Curve Cryptography covers all relevant asymmetric cryptographic primitives like digital signatures and key agreement algorithms. The function used for this purpose is the scalar multiplication k.P which is the core operation of ECCs. Where k is an integer and P is a point on an elliptic curve. This article explains the role of ECC in the network security. ECC's uses with smaller keys to provide high security and high speed.
Date of Conference: 09-11 May 2011
Date Added to IEEE Xplore: 27 June 2011
ISBN Information:
Conference Location: Tipaza, Algeria

Contact IEEE to Subscribe

References

References is not available for this document.