Implementation of Blom’s key predistribution scheme by using elliptic curve cryptography / Md Nizam Udin ... [et al.]
Cryptography, along with its various methods is used to serve the security communication purpose. Cryptography is said to be secure if the encryption key is hard to break by the attacker. Initially, Blom’s Key pre-distribution uses an integer finite field which makes this scheme easy to be intervene...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Penerbit UiTM
2021
|
Subjects: | |
Online Access: | https://ir.uitm.edu.my/id/eprint/49132/1/49132.pdf https://ir.uitm.edu.my/id/eprint/49132/ https://mjoc.uitm.edu.my/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Teknologi Mara |
Language: | English |