2018 2nd International Conference on I-Smac (IoT in Social, Mobile, Analytics and Cloud) (I-Smac)i-Smac (IoT in Social, Mobile, 2018
DOI: 10.1109/i-smac.2018.8653689
|View full text |Cite
|
Sign up to set email alerts
|

Prominence Of ECDSA Over RSA Digital Signature Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 3 publications
0
7
0
Order By: Relevance
“…The recommended data encryption solution uses symmetric encryption including AES. The empirical comparison was made by authors in [4] of the asymmetric algorithms. The results show that the difference in running time between the two methods of generating key pairs and forming digital signatures is insignificant.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The recommended data encryption solution uses symmetric encryption including AES. The empirical comparison was made by authors in [4] of the asymmetric algorithms. The results show that the difference in running time between the two methods of generating key pairs and forming digital signatures is insignificant.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Both hardware and software efficiency of ECC cryptography is evaluated in this work. Similarly, [6] has assessed the performance of digital signature schemes. ECDSA is chosen because of its high-security level and limited resources of IoT devices.…”
Section: Privacy Mechanismsmentioning
confidence: 99%
“…The input parameters for RSA and ECDSA differ slightly due to their inherent properties. The choice of the algorithm is developer dependent, and there are specific trade-offs that will need to be considered [ 60 , 61 ].…”
Section: Phase Ii: Enhancement Of Security Measuresmentioning
confidence: 99%