Multiple Encryption using ECC and its Time Complexity Analysis

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Time stamp based ECC encryption and decryption

Elliptic Curve Cryptography (ECC) provides a secure means of exchanging keys among communicating hosts using the diffie hellman key exchange algorithm. Encryption and decryption of texts and messages have also been attempted. In the paper on Knapsack over ECC algorithm, the authors presented the implementation of ECC by first transforming the message into an affine point on the EC, and then app...

متن کامل

Efficient Image Encryption Using Mrf and Ecc

In this era, network security has become an issue of importance, on which lot of research is going on. We have proposed a two level image encryption method using elliptic curve cryptography (ECC) which has been made more efficient by Markov random field (MRF). In this method a texture image generated using seed by MRF. This seed is use as secrete key that generated by elliptic curve method. XOR...

متن کامل

Knapsack Based ECC Encryption and Decryption

Elliptic Curve Cryptography provides a secure means of exchanging keys among communicating hosts using the Diffie Hellman Key Exchange algorithm. Encryption and Decryption of texts and messages have also been attempted. This paper presents the implementation of ECC by first transforming the message into an affine point on the EC, and then applying the knapsack algorithm on ECC encrypted message...

متن کامل

Energy Analysis of Wireless Sensor Networks using RSA and ECC Encryption Method

Wireless Sensor Networks consist of sensor nodes and few powerful control mobile laptops performing activities like routing, data aggregation etc over wireless media. However such kind of environment prone great security threats due to the broadcast nature of the transmission medium. Sensor networks pose unique challenges; traditional security techniques used in traditional networks cannot be a...

متن کامل

The Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC

Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Engineering in Research Trends

سال: 2016

ISSN: 2349-7084

DOI: 10.22362/ijcert/2016/v3/i11/48907