2017 5th International Conference on Electrical Engineering - Boumerdes (ICEE-B) 2017
DOI: 10.1109/icee-b.2017.8192159
|View full text |Cite
|
Sign up to set email alerts
|

A new approach of elliptic curve Diffie-Hellman key exchange

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 28 publications
(9 citation statements)
references
References 7 publications
0
9
0
Order By: Relevance
“…SAP employs Elliptic Curve Cryptography (ECC) to generate and exchange keys, and symmetric encryption scheme to encrypt transmitted messages. ECC is chosen because it has outperformed the existing key generation algorithms such as RSA, owing to its shorter key size and small computational overhead [16]. Short key size makes ECC faster and suitable for small and embedded devices.…”
Section: The Proposed Protocolmentioning
confidence: 99%
“…SAP employs Elliptic Curve Cryptography (ECC) to generate and exchange keys, and symmetric encryption scheme to encrypt transmitted messages. ECC is chosen because it has outperformed the existing key generation algorithms such as RSA, owing to its shorter key size and small computational overhead [16]. Short key size makes ECC faster and suitable for small and embedded devices.…”
Section: The Proposed Protocolmentioning
confidence: 99%
“…Basis reduction is a technique for reducing the basis B of a given lattice L to a smaller basis B0 without changing the lattice L. Figure 5 depicts a two-dimensional lattice with two different bases. The basis determinant is shaded, and the right basis is reduced and orthogonal [31,32]. The following are the steps to change the basis while keeping the same lattice.…”
Section: Ecdsa -Disclosing the Private Key Using Lenstra-lenstra-lova...mentioning
confidence: 99%
“…RSA, because of shorter key length for similar security levels [83]. Public keys can be used as static or ephemeral, which are not authenticated and temporary [105].…”
Section: A Security During Commissioning Of Secretsmentioning
confidence: 99%