2021 2nd International Conference on Computational Methods in Science &Amp; Technology (ICCMST) 2021
DOI: 10.1109/iccmst54943.2021.00021
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic algorithms in IoT - a detailed analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 19 publications
0
1
0
Order By: Relevance
“…Through their examination, the authors reached the consensus that among various options, Schnorr, RSA, Elliptic Curve Cryptography, and ElGamal emerge as the superior choices. Kaur and Aggarwal [13] undertook an extensive examination of cryptographic methods including RSA, Blowfish, Diffie-Hellman, ECC, and others. Among these techniques, ECC has demonstrated itself as the encryption method that excels in both security and efficiency.…”
Section: Related Workmentioning
confidence: 99%
“…Through their examination, the authors reached the consensus that among various options, Schnorr, RSA, Elliptic Curve Cryptography, and ElGamal emerge as the superior choices. Kaur and Aggarwal [13] undertook an extensive examination of cryptographic methods including RSA, Blowfish, Diffie-Hellman, ECC, and others. Among these techniques, ECC has demonstrated itself as the encryption method that excels in both security and efficiency.…”
Section: Related Workmentioning
confidence: 99%