2016
DOI: 10.19101/tis.2017.26001
|View full text |Cite
|
Sign up to set email alerts
|

A survey on security of mobile handheld devices through elliptic curve cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…We have also used the Diffie-Hellman algorithm, but we have complemented it with Elliptic Curve Cryptography (ECC) for generating the public key corresponding to the secret key. ECC is a public key encryption technique based on elliptic curves theory that can be used to create faster, smaller, and more efficient cryptographic keys than other first-generation encryption public key algorithms such as RSA and Diffie-Hellman, so it is recommended for mobile and wireless devices [12]. Another method proposed by related research papers is the key management based on Attribute-Based Encryption (ABE), a type of public-key encryption in which the secret key of a user and the cipher-text are dependent upon attributes [13].…”
Section: Security Considerations For D2d Communications and Related Workmentioning
confidence: 99%
“…We have also used the Diffie-Hellman algorithm, but we have complemented it with Elliptic Curve Cryptography (ECC) for generating the public key corresponding to the secret key. ECC is a public key encryption technique based on elliptic curves theory that can be used to create faster, smaller, and more efficient cryptographic keys than other first-generation encryption public key algorithms such as RSA and Diffie-Hellman, so it is recommended for mobile and wireless devices [12]. Another method proposed by related research papers is the key management based on Attribute-Based Encryption (ABE), a type of public-key encryption in which the secret key of a user and the cipher-text are dependent upon attributes [13].…”
Section: Security Considerations For D2d Communications and Related Workmentioning
confidence: 99%