TITLE

ECDH

PUB. DATE
December 2015
SOURCE
Computer Desktop Encyclopedia;2015, p1
SOURCE TYPE
Encyclopedia
DOC. TYPE
Article
ABSTRACT
See elliptic curve Diffie-Hellman.
ACCESSION #
111842001

 

Related Articles

  • Climbing syphilis cases in Erie Co. Beckes, Laura A. // Erie Gay News;Nov2015, Issue 240, p5 

    The article reports that the Erie County Department of Health (ECDH) in New York City is spreading awareness regarding testing for syphilis as there is an increase in the disease in gay and bisexual men and mentions recommendations by the U.S. Center for Disease Control (CDC) for testing.

  • Provably secure group key agreement protocol based on ECDH with integrated signature. Naresh, Vankamamidi S.; Murthy, Nistala V. E. S. // Security & Communication Networks;7/10/2016, Vol. 9 Issue 10, p1085 

    This paper proposes a new two round authenticated contributory group key agreement (ACGKA) protocol based on elliptic curve Diffie-Hellman (ECDH) with integrated signature. In this technique, one node is picked up as the group controller, and this node runs an authenticated ECDH with the rest of...

  • A COMPARATIVE STUDY OF CRYPTOSYSTEMS WITH ELLIPTIC CURVE CRYPTOGRAPHY USING DIGITAL SIGNATURE. Shukla, Shipra; Gupta, Dharmendra Lal; Malviya, Anil Kumar // International Journal of Computer Technology & Applications;2012, Vol. 3 Issue 1, p9 

    Elliptic Curve Cryptography (ECC) is coming forth as an attractive public key cryptosystem for mobile/wireless environments compared to conventional cryptosystems like RSA and DSA. ECC provides better security with smaller key sizes, which results in faster computations, lower power consumption,...

  • A key management technique based on elliptic curves for static wireless sensor networks. Jilna, Payingat; Pattathil, Deepthi P. // Security & Communication Networks;Dec2015, Vol. 8 Issue 18, p3726 

    This paper presents a key distribution scheme based on elliptic curve Diffie-Hellman (ECDH) key exchange for static wireless sensor networks with node addition. The proposed scheme relies on the transitory master key approach for secret key establishment and addresses the man-in-the-middle...

  • Ternary Tree Based Group Key Agreement for Cognitive Radio MANETs. Renugadevi, N.; Mala, C. // International Journal of Computer Network & Information Security;Sep2014, Vol. 6 Issue 10, p24 

    This paper presents an efficient contributory group key agreement protocol for secure communication between the lightweight small devices in cognitive radio mobile ad hoc networks. A Ternary tree based Group ECDH.2 (TGECDH.2) protocol that uses a batch rekeying algorithm during membership change...

  • A Lucas Based Cryptosystem Analog to the ElGamal Cryptosystem and Elliptic Curve Cryptosystem. Tze Jin Wong; Md Said, Mohd. Rushdan; Othman, Mohamed; Lee Feng Koo // AIP Conference Proceedings;2014, Vol. 1635, p256 

    In this paper, a new cryptosystem will be developed which is analogue to ElGamal encryption scheme and based on Lucas sequence in the elliptic curve group over finite field. In this encryption scheme, an Elliptic curve Diffie-Hellman (ECDH) key agreement be the first part of the encryption, the...

  • Optimized Software Implementation of ECC over 192-bit NIST Curve. Kodali, Ravi Kishore; Budwal, Harpreet Singh; Sarma, Narasimha // International Journal on Recent Trends in Engineering & Technolo;Jul2013, Vol. 9 Issue 1, p7 

    RSA is the most widely used public key cryptosystem, serving the purpose of key exchange for symmetric key cryptography and authentication. Improved network security demands forward secrecy, which RSA is unable to provide. Also the lower per bit security of the RSA technique, makes it difficult...

  • MPTCP에서 ECDH를 이용한 세션 키 자동생성에 관한 연구. 선설희; 김은기 // Journal of the Korea Institute of Information & Communication En;2016, Vol. 20 Issue 10, p1912 

    MPTCP(Multipath Transmission Control Protocol) is able to compose many TCP paths when two hosts connect and the data is able to be transported through these paths simultaneously. When a new path is added, the authentication between both hosts is necessary to check the validity of host. So, MPTCP...

  • SRCE: Security protocol in RFID back-end system based on Certificate and ECDH. Zhang Bing; Wan Guogen // Applied Mechanics & Materials;2014, Issue 577, p970 

    The RFID back-end system is the core of the thing of networking technical framework, and it has suffered more security threats. In the face of these security problems in the backend system, this paper design a node bidirectional authentication and key exchange protocol based on certificate and...

  • ROSS: Low-Cost Self-Securing VoIP Communication Framework. Syafalni, Alfin; Samsudin, Azman; Jaafar, Yazid; Omar, Mohd. Adib // KSII Transactions on Internet & Information Systems;Dec2012, Vol. 6 Issue 12, p3366 

    Reliance on the Internet has introduced Voice over Internet Protocol (VoIP) to various security threats. A reliable security protocol and an authentication scheme are thus required to prevent the aforementioned threats. However, an authentication scheme often demands additional cost and effort....

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics