Oblivious Transfer Using Elliptic Curves
CIC '06 Proceedings of the 15th International Conference on Computing
Stream Ciphers Based on the Elliptic Curves
ICCIMA '07 Proceedings of the International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007) - Volume 04
Research on Implementation of Elliptic Curve Cryptosystem in E-Commerce
ISECS '08 Proceedings of the 2008 International Symposium on Electronic Commerce and Security
The advantages of elliptic curve cryptography for wireless security
IEEE Wireless Communications
Hi-index | 0.00 |
Now a day, there are so many drawbacks in recent encryption techniques respectively. In security, performance in real-time etc., Many developing cryptography researchers to instigate and to increase the security developments, developed many cryptographic algorithms. Among them, ECC uses smaller key to provide high security and performance in real time as same level to other cryptographic algorithms. In this paper, we have discussed many mathematical performance of ECC, applications of ECC. ECC uses with smaller keys to provide high security and high speed in a low bandwidth.