2016
DOI: 10.22362/ijcert/2016/v3/i11/48907
|View full text |Cite
|
Sign up to set email alerts
|

Multiple Encryption using ECC and its Time Complexity Analysis

Abstract: Abstract-Rapid growth of information technology in present era, secure communication, strong data encryption technique and trusted third party are considered to be major topics of study. Robust encryption algorithm development to secure sensitive data is of great significance among researchers at present. The conventional methods of encryption used as of today may not sufficient and therefore new ideas for the purpose are to be design, analyze and need to be fit into the existing system of security to provide … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 1 publication
0
4
0
Order By: Relevance
“…9 reveals that proposed monte Carlo based algorithm took less computational time as compared to other techniques. Encryption and decryption computational time complexity is clearly lesser than in compared algorithms ECC [20] and AES [21].…”
Section: Comparison Analysis For Encryption and Decryption Algorithmmentioning
confidence: 86%
See 1 more Smart Citation
“…9 reveals that proposed monte Carlo based algorithm took less computational time as compared to other techniques. Encryption and decryption computational time complexity is clearly lesser than in compared algorithms ECC [20] and AES [21].…”
Section: Comparison Analysis For Encryption and Decryption Algorithmmentioning
confidence: 86%
“…A comparison analysis of the proposed key generation algorithm is performed with the Kumar et al [20]. Fig.…”
Section: Comparison Analysis For Key Generation Algorithmmentioning
confidence: 99%
“…Decryption time of the multiple schemes is tested where the proposed genetic-based algorithm has less time complexity as compared to other schemes for decryption of data. Time of AES [2] and ECC [30] with proposed genetic based algorithm is observed, and it is noted that AES is taking more time and have high computations and genetic based algorithm have less computations.…”
Section: E Comparison Analysis Of Encryption and Decryption Algorithmmentioning
confidence: 99%
“…The equation is of degree 3 because the highest degree of x in the equation is 3. Elliptic curves operate over both prime field, F p , and binary field, F 2 m [2].…”
Section: Introductionmentioning
confidence: 99%