Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/8057
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKumar, Gautam-
dc.contributor.authorSaini, Hemraj-
dc.contributor.authorDimlo, U. M. Fernandes-
dc.date.accessioned2022-11-01T10:27:25Z-
dc.date.available2022-11-01T10:27:25Z-
dc.date.issued2018-
dc.identifier.urihttp://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/8057-
dc.description.abstractAn Elliptic Curve Cryptography (ECC) algorithm is one of the most powerful with respect to better security and performance than RSA algorithm. Most of applications prefer to implement this approach due to the use of shorter key sizes, low computation costs and most probably the discrete logarithmic problem is hard to achieve. In addition to it, with the support of hardware most of computation costs have been reduced in the general observation and widely available the reduction of pre-computed operations using strategies is playing one of the concerns in research gap creation. In the manuscript, we analyzed the proposed Radix-16 scalar multiplications without pre-computation for ECC and considered to be one of advanced approach technique, which is counted in the form of reduced complexity costs, reliable and secure computing. It also consists in relation to the more appropriateness for low memory devices and reduced instruction set computing, therefore a possible deployment is considered.en_US
dc.language.isoenen_US
dc.publisherSpringer Nature Singapore Pte Ltd.en_US
dc.subjectScalar multiplicationen_US
dc.subjectRadix-16en_US
dc.subjectComplexityen_US
dc.titleDeployment Consideration on Secure Computation for Radix-16 Scalar Multiplicationen_US
dc.typeBook chapteren_US
Appears in Collections:Book Chapters

Files in This Item:
File Description SizeFormat 
Deployment Consideration on Secure Computation for Radix-16 Scalar Multiplication.pdf2.8 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.