2022
DOI: 10.1149/10701.7457ecst
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Survey on Lightweight Asymmetric Key Cryptographic Algorithm for Resource Constrained Devices

Abstract: Elliptic Curve Cryptography, being a popular lightweight asymmetric key cryptographic algorithm that is widely adapted to meet high security requirement of resource constrained devices, were surveyed in this work. Further, ECC-based ElGamal cryptosystem, Elliptic Curve Digital Signature Algorithm, and Elliptic Curve Diffie Hellman Key Exchange Algorithm have been comprehensively reviewed with its characteristics and preferred applications. In addition, few related work are analyzed and suggestions for suitable… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…For formal security analysis, the author used the BAN-logic model to check the usefulness of this scheme against different security threats. For a comprehensive analysis of key-based authentication schemes, we suggest the involved stakeholders to follow up references [105][106].…”
Section: E Cryptography and Non-cryptography Based Solutionsmentioning
confidence: 99%
“…For formal security analysis, the author used the BAN-logic model to check the usefulness of this scheme against different security threats. For a comprehensive analysis of key-based authentication schemes, we suggest the involved stakeholders to follow up references [105][106].…”
Section: E Cryptography and Non-cryptography Based Solutionsmentioning
confidence: 99%
“…The symmetric encryption methods also include Elliptic Curve Cryptography (ECC), Diffie-Hellman and, RSA [23]. The usually used asymmetric encryption technique as known as RSA which uses a public key for encryption while a private key for decryption.…”
Section: Comparison Of Encryption Techniques and Algorithmsmentioning
confidence: 99%