Safe communication and custody of the password using Elliptic Curve over finite field
dc.campus | Visakhapatnam | |
dc.contributor.author | Sravana Kumar, D. | |
dc.contributor.author | Suneetha, Ch. | |
dc.contributor.author | Sirisha, P. | |
dc.date.accessioned | 2023-07-21T09:09:04Z | |
dc.date.accessioned | 2025-02-01T13:17:11Z | |
dc.date.available | 2023-07-21T09:09:04Z | |
dc.date.issued | 2018 | |
dc.description.abstract | In the modern digital world electronic communication has become mandatory. In these days we need password or PIN everywhere. Encryption, communication and memorizing the password have become annoying and painful difficulties in digital network. The task of cracking the password is a piece of cake for the active intruder of the present generation to gain unauthorized data. In the present paper authors designed an innovative method for safe communication and custody of the password or PIN using elliptic curve over finite field. | |
dc.identifier.issn | 1314-3395 | |
dc.identifier.uri | https://dspacenew8-imu.refread.com/handle/123456789/1748 | |
dc.language.iso | en | |
dc.publisher | International Journal of Pure and Applied Mathematics | |
dc.school | School of Naval Architecture and Ocean Engineering | |
dc.subject | Words-elliptic curve over finite field | |
dc.subject | Encryption | |
dc.subject | Decryption | |
dc.subject | Denial of service | |
dc.subject | Diffie-Hellman | |
dc.subject | Binary number | |
dc.title | Safe communication and custody of the password using Elliptic Curve over finite field | |
dc.type | Article |
Files
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- Safe communication and custody of the password using Elliptic Curve over finite field.pdf
- Size:
- 1.05 MB
- Format:
- Adobe Portable Document Format
License bundle
1 - 1 of 1