Back to Results
First PageMeta Content
Finite fields / Elliptic curves / Public-key cryptography / Elliptic curve / Cipher / Integrated Encryption Scheme / Index of cryptography articles / Cryptography / Abstract algebra / Elliptic curve cryptography


International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.1, January[removed]ENCRYPTION OF DATA USING ELLIPTIC CURVE OVER FINITE FIELDS D. Sravana Kumar1 1
Add to Reading List

Document Date: 2012-02-09 20:01:10


Open Document

File Size: 183,81 KB

Share Result on Facebook

City

Visakhapatnam / Greenwich / Norwell / Visakhapatnam Dt. / /

Company

Pearson / Sun Microsystems Laboratories / /

Country

India / /

/

Facility

SVLNS Government College / Government College / GITAM University / /

IndustryTerm

crypto systems / elliptic curve crypto-processor / symmetric cryptographic protocols / excellent solution / establishment protocol / round protocol / cryptographic applications / finite field digital signature algorithm / energy-constrained devices / authentic session key establishment protocols / encryption algorithm / /

Organization

GITAM University / SVLNS Government College / Department of Engineering Mathematics / ASIC / Government College / Government of India / Department of Atomic Energy / Department of Engineering Mathematics in GITAM University / /

Person

Neil Koblitz / Alice Alice / Scott A. Vanstone / Victor Miller / Amol Dabholkar / Anna M. Johnston / Suneetha / D. Sravana Kumar / Alfred J. Menezes / Mohsen Machhout eat.al / Eric R. Verheul / Bob Bob / Alice / Asrjen K. Lenstra / William Stallings / Peter S. Gemmell / A. Chandrasekhar / Darrel Hankerson / /

Position

Professor and Head / Assistant Professor in Engineering / scientist / general public keys X1 / X2 / general public keys / Professor in Engineering / ex- scientist / /

ProgrammingLanguage

C / /

PublishedMedium

Journal of Cryptology / /

Technology

FPGA / authenticated session Key establishment protocol / finite field digital signature algorithm / encryption algorithm / authentic session key establishment protocols / key-exchange protocol / data encryption / private key / secret key / public key encryption / encryption / Cryptography / ASIC / public key / 3.1 Encryption / 4.1 Encryption / elliptic curve crypto-processor / 2012 ENCRYPTION / digital signature / symmetric cryptographic protocols / one round protocol / /

URL

http /

SocialTag