How to construct efficient signcryption schemes on elliptic curves
Information Processing Letters
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Journal of Systems and Software
Access control in user hierarchy based on elliptic curve cryptosystem
Information Sciences: an International Journal
A new provably secure authentication and key agreement protocol for SIP using ECC
Computer Standards & Interfaces
New stream ciphers based on elliptic curve point multiplication
Computer Communications
Journal of Systems and Software
An Improved Proxy Signature Scheme Based on Elliptic Curve Cryptography
ICCCS '09 Proceedings of the 2009 International Conference on Computer and Communications Security
Private key agreement and secure communication for heterogeneous sensor networks
Journal of Parallel and Distributed Computing
Efficient utilization of elliptic curve cryptosystem for hierarchical access control
Journal of Systems and Software
Journal of Network and Computer Applications
Hi-index | 0.00 |
Elliptic curve cryptosystems are based on ECDLP (Elliptic curve discrete logarithm problem) for their security. The best known method to solve ECDLP (pollard's rho algorithm) is fully exponential therefore Elliptic Curve Cryptosystems require substantially smaller key sizes for equivalent security as compared to other public key cryptosystems (RSA, DSA). This paper discusses the technique of Elliptic Curve Cryptography (ECC). Due to its computational benefits such as faster computation, low power and memory consumption, bandwidth saving, ECC is best suited for mobile/wireless environments. The application of ECC in mobile devices and wireless networks has been discussed in the paper. A survey of various protocols based on ECC has been done in the paper which clearly depicts its increasing acceptance over other public key cryptosystems.