Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 5 SI
Page No. 4654 - 4662

Novel Design on RADG with Elliptic Curve

Authors : Salah Albermany and Ali Hasan Alwan

References

Albermany, S.A. and G.A. Safda, 2014. Keyless security in wireless networks. Wirel. Pers. Commun., 79: 1713-1731.
CrossRef  |  Direct Link  |  

Blake, I., G. Seroussi and N. Smart, 1999. Elliptic Curves Cryptography. Cambridge University Press, New York.

Boyd, C. and A. Mathuria, 2013. Protocols for Authentication and Key Establishment. Springer, Berlin, Germany, ISBN:978-3-642-07716-6, Pages: 321.

Cohen, H., G. Frey, R. Avanzi, C. Doche, T. Lange, K. Nguyen and F. Vercauteren, 2005. Handbook of Elliptic and Hyperelliptic Curve Cryptography. Taylor and Francis Group, London, ISBN-13: 9781420034981, Pages: 848.

Kou, W., 2012. Networking Security and Standards. Vol. 394, Springer, Berlin, Germany, ISBN:978-1-4613-7820-4, Pages: 203.

Menezes, A.J., C.V.O. Pual and A.V. Scott, 1996. Handbook and Applied Cryptography. CRC Press, Boca Raton, Florida, USA., ISBN:13-978-0-84-938523-0, Pages: 755.

Stallings, W., 2011. Cryptography and Network Security: Principles and Practice. 5th Edn., Prentice Hall, USA., ISBN: 9780136097044, Pages: 719.

Stinson, D.R., 2005. Cryptography: Theory and Practice. 3rd Edn., CRC Press, Boca Raton, Florida, USA., ISBN:978-1-58488-508-5, Pages: 583.

Udin, M.N., S.A. Halim, M.I. Jayes and H. Kamarulhaili, 2012. Application of message embedding technique in el-gamal elliptic curve cryptosystem. Proceedings of the International Conference on Statistics in Science, Business and Engineering (ICSSBE), September 10-12, 2012, IEEE, Langkawi, Malaysia, ISBN:978-1-4673-1581-4, pp: 1-6.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved