Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
An Efficient Protocol for Authenticated Key Agreement
Designs, Codes and Cryptography
A Secure Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptography
IAS '07 Proceedings of the Third International Symposium on Information Assurance and Security
The advantages of elliptic curve cryptography for wireless security
IEEE Wireless Communications
Timestamp based authentication protocol for smart card using ECC
WISM'11 Proceedings of the 2011 international conference on Web information systems and mining - Volume Part I
Hi-index | 0.00 |
Public Key Cryptography (PKC) is recently playing an essential role in electronic banking and financial transactions. Elliptic Curve Cryptography (ECC) is one of the best public key techniques for its small key size and high security and is suitable for secure access of smart cards because implementation on smart cards is challenging to the platforms memory, bandwidth, and computation constraints. This paper proposes a mutual authentication protocol based on ECDSA for a secure access of smart card which allows both the server and the user to verify each other's authenticity. Our scheme is efficient as it results in reducing cost and improving performance by using ECC in smart cards.