Please use this identifier to cite or link to this item:
http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/8057
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kumar, Gautam | - |
dc.contributor.author | Saini, Hemraj | - |
dc.contributor.author | Dimlo, U. M. Fernandes | - |
dc.date.accessioned | 2022-11-01T10:27:25Z | - |
dc.date.available | 2022-11-01T10:27:25Z | - |
dc.date.issued | 2018 | - |
dc.identifier.uri | http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/8057 | - |
dc.description.abstract | An Elliptic Curve Cryptography (ECC) algorithm is one of the most powerful with respect to better security and performance than RSA algorithm. Most of applications prefer to implement this approach due to the use of shorter key sizes, low computation costs and most probably the discrete logarithmic problem is hard to achieve. In addition to it, with the support of hardware most of computation costs have been reduced in the general observation and widely available the reduction of pre-computed operations using strategies is playing one of the concerns in research gap creation. In the manuscript, we analyzed the proposed Radix-16 scalar multiplications without pre-computation for ECC and considered to be one of advanced approach technique, which is counted in the form of reduced complexity costs, reliable and secure computing. It also consists in relation to the more appropriateness for low memory devices and reduced instruction set computing, therefore a possible deployment is considered. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Springer Nature Singapore Pte Ltd. | en_US |
dc.subject | Scalar multiplication | en_US |
dc.subject | Radix-16 | en_US |
dc.subject | Complexity | en_US |
dc.title | Deployment Consideration on Secure Computation for Radix-16 Scalar Multiplication | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | Book Chapters |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Deployment Consideration on Secure Computation for Radix-16 Scalar Multiplication.pdf | 2.8 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.