Analysis and implementation of National Security Agency (NSA) suite B : Elliptic-Curve Diffie-Hellman (ECDH) key agreement algorithm
With the emerging of technology, there are many applications that require secure communication, for example, in mobile/wireless environments. Elliptic Curve Cryptography (ECC) is emerging as an attractive and effective public-key cryptosystem. Elliptic curves are widely used in various key exchange...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2009
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/15754 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |