Main Article Content
Abstract
Keywords
Article Details
Authors retain the copyright without restrictions for their published content in this journal. IJSRTM is a SHERPA ROMEO Journal.
Publishing License
This is an open-access article distributed under the terms of
References
- William Stallings, Cryptography and Network Security, Prentice Hall, 4th Edition, 2006.
- V. Miller, “Uses of elliptic curves in cryptographyâ€, Advances in Cryptology, Springer-Verlog
- New York,1986
- Jeffrey L. Vagle, “A Gentle Introduction to Elliptic Curve Cryptographyâ€,BBN
- Technology,Nov21,2010.
- D.Hankerson, A.Menezes, and S.A. Vanstone, Guide to Elliptic Curve Cryptography, Springer-
- Verlag, 2004.
- ElGamal, T., “A public key cryptosystem and a Signature scheme based on discrete logarithm,â€
- IEEE Trans. Informn, Theory, IT-31, no.4, pp 469-472, July 1985.
References
William Stallings, Cryptography and Network Security, Prentice Hall, 4th Edition, 2006.
V. Miller, “Uses of elliptic curves in cryptographyâ€, Advances in Cryptology, Springer-Verlog
New York,1986
Jeffrey L. Vagle, “A Gentle Introduction to Elliptic Curve Cryptographyâ€,BBN
Technology,Nov21,2010.
D.Hankerson, A.Menezes, and S.A. Vanstone, Guide to Elliptic Curve Cryptography, Springer-
Verlag, 2004.
ElGamal, T., “A public key cryptosystem and a Signature scheme based on discrete logarithm,â€
IEEE Trans. Informn, Theory, IT-31, no.4, pp 469-472, July 1985.