Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Implementing elliptic curve cryptography
Implementing elliptic curve cryptography
Foundations of Cryptography: Basic Tools
Foundations of Cryptography: Basic Tools
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Constructing elliptic curves with given group order over large finite fields
ANTS-I Proceedings of the First International Symposium on Algorithmic Number Theory
Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series)
Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series)
Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series)
Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series)
Cryptography based access control in healthcare web systems
2010 Information Security Curriculum Development Conference
Hi-index | 0.00 |
The cryptography of elliptical curve (ECC) is an approach in cryptography public key based on the algebraic structure of elliptical curves on the finished fields; a smaller group can be used to obtain the same level of security as RSA-based. In this article a simple presentation on cryptography with focus on elliptic curve algorithm, examine its security, benefits and its functions with privacy issues. The last part of this article is "protection and privacy components", for each component the article look at privacy issue then examine the elliptic curve angle to be used with the component. These work results in using elliptic curve in multipart security (or single party) is more efficient in key size, speed and retrieve encrypted information.