2021
DOI: 10.3991/ijim.v15i23.26337
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight and Secure Elliptical Curve Cryptography (ECC) Key Exchange for Mobile Phones

Abstract: Open networks enable data communication between different types of mobile devices that showcase the need to enforce elevated security measures. Securing sensitive or confidential data in mobile phones is accomplished by implementing a diverse range of cryptographic techniques. While encryption algorithms, such as Rivest–Shamir–Adleman (RSA) may offer secure solutions that are often difficult to compromise, these in turn prerequisite high speed computational resources for effective operation. Elliptical curve c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…The extended version of DES, known as Triple-DES (i.e., TDES or 3-DES), will be used in government and finance for many years to come. The differences and similarities between DES and Triple-DES are shown in Table 12 [14,[23][24][25][26][27][28][29].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The extended version of DES, known as Triple-DES (i.e., TDES or 3-DES), will be used in government and finance for many years to come. The differences and similarities between DES and Triple-DES are shown in Table 12 [14,[23][24][25][26][27][28][29].…”
Section: Discussionmentioning
confidence: 99%
“…To make it clear, we have outlined how DES algorithm operates to convert plain text to cipher text inFigures 25,26,and 27. …”
mentioning
confidence: 99%
“…Taking this thought forward, successive attempts have been made to establish new scales to measure cyberloafing. This is necessary, taking into account the advancement in the information and communication technology [33]. Authors in [34] introduced and validated a new scale for cyberloafing, that takes into account five factors: shopping, sharing, accessing online content, gaming/gambling and real-time updating.…”
Section: Evolving Conceptualization and Measurement Of Cyberloafingmentioning
confidence: 99%
“…It is possible to make a group out of a set of points on an elliptic curve, but defining a curve point operation with the properties given in the above properties can be accomplished in the following manner [17].…”
Section: Elliptic Curve Cryptographymentioning
confidence: 99%
“…Homomorphic encryption is a powerful cryptography technique that enables certain computations to be performed directly on ciphertext while ensuring that operations performed on the encrypted data produce identical results to those performed on the plaintext. It contributes to data integrity protection by allowing others to manipulate the encrypted version of the data while no one can comprehend or access the decrypted values [17]. The homomorphic encryption technique protects your privacy and enables immediate access to encrypted data.…”
Section: Homomorphic Encryptionmentioning
confidence: 99%