Group security using ECC

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Security Analysis of GSM Security using ECC Technique

GSM (Group Special Mobile or System for Mobile Communications) is the PAN-EUROPEAN standard for digital cellular communication. GSM provides enhanced features when compared with the older analog-based wireless systems. A GSM network is more vulnerable to unauthorized access and eavesdropping when compared with the traditional fixed wired networks due to the mobility of users, the transmission o...

متن کامل

CLB-ECC: Certificateless Blind Signature Using ECC

Certificateless public key cryptography (CL-PKC) is a new benchmark in modern cryptography. It not only simplifies the certificate management problem of PKC, but also avoids the key escrow problem of the identity based cryptosystem (ID-PKC). In this article, we propose a certificateless blind signature protocol which is based on elliptic curve cryptography (CLB-ECC). The scheme is suitable for ...

متن کامل

ECC , Future Resiliency and High Security Systems

Each particular algorithm has certain security and performance attributes, which translate into advantages and disadvantages relative to a solution that meets a user’s needs. One of the tasks of a cryptosystem designer is to weigh the advantages and disadvantages and select the algorithmic tools that best address the problem to be solved. The first part of this paper summarizes some advantages ...

متن کامل

An Innovative Approach for Enhancing the Security of Amazigh Text Using Graph Theory Based ECC

Security in today’s world is one of the important challenges. Encryption is one of the popular methods to achieve secret communication between sender and receiver. Graph theory is widely used as a tool of encryption, due to its various properties and its easy representation in computers as a matrix. In this paper we introduce an enhanced approach of elliptic curve encryption algorithm for achie...

متن کامل

Power Analysis Attacks on ECC: A Major Security

Wireless sensor networks (WSNs) are largely deployed in different sectors and applications, and Elliptic Curve Cryptography (ECC) is proven to be the most feasible PKC for WSN security. ECC is believed to provide same level of security such as RSA with a much shorter key length, and thus they seem to be ideal for applications with small resources such a sensor network, smartcard, RFID, etc. How...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Information Technology

سال: 2021

ISSN: 2511-2104,2511-2112

DOI: 10.1007/s41870-021-00613-1