Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 13
Page No. 3329 - 3333

A New Text Encryption Technique on Elliptic Curve Cryptography

Authors : Wrya Karim Kadir, Omed Hassan Ahmed and Mohammed Rafiq Namiq

References

Esfahani, M., M. Emami and H. Tajnesaei, 2013. The investigation of the relation between job involvement and organizational commitment. Manage. Sci. Lett., 3: 511-518.
CrossRef  |  Direct Link  |  

Koblitz, N., 1987. Elliptic curve cryptosystems. Math. Comput., 48: 203-209.
Direct Link  |  

Koblitz, N., A. Menezes and S. Vanstone, 2000. The state of elliptic curve cryptography. Des. Code Cryptogr., 19: 173-193.
Direct Link  |  

Kolhekar, M. and A. Jadhav, 2011. Implementation of elliptic curve cryptography on text and image. Intl. J. Enterp. Comput. Bus. Syst., 1: 1-13.
Direct Link  |  

Kumar, D., C.H. Suneetha and A. Chandrasekhar, 2012. Encryption 0f data using elliptic curve over finite field. Intl. J. Distrib. Parallel Syst., 3: 301-308.
Direct Link  |  

Miller, V.S., 1986. Use of Elliptic Curves in Cryptography. In: Advances in Cryptology-CRYPTO'85, Williams, H.C. (Ed.)., Springer-Verlag, Berlin, Heidelberg, pp: 417-426.

Sagheer, A.M., 2012. Elliptic curves cryptographic techniques. Proceedings of the 6th International Conference on Signal Processing and Communication Systems (ICSPCS’12), December 12-14, 2012, IEEE, Gold Coast, Queensland, Australia, ISBN:978-1-4673-2392-5, pp: 1-7.

Tahmassebpour, M., 2017. A new method for time-series big data effective storage. IEEE Access, 2007: 10694-10699.
CrossRef  |  Direct Link  |  

Teeriaho, J., 2011. Cyclic Group Cryptography with Elliptic Curves. Lapland University of Applied Sciences, Rovaniemi, Finland,.

Yan, S.Y., 2000. Number Theory for Computing. Springer, Berlin, Germany, ISBN:9783540654728, Pages: 381.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved