Elliptical curve cryptography
In cryptography, the aim is to achieve security through encryption and this involves transforming a message also known as plaintext to cipher text via an encryption method. This encrypted message is to be unravelled by legitimate parties that possess certain information called “keys”. The usag...
Saved in:
Main Author: | Toh, Zheng Yi. |
---|---|
Other Authors: | Chan Choong Wah |
Format: | Final Year Project |
Language: | English |
Published: |
2009
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/15765 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Application of elliptic curve cryptography in web security
by: Pham, Tan Phat.
Published: (2009) -
Speeding up secure web transactions using elliptic curve cryptography
by: Lim, Lai Koon.
Published: (2010) -
Efficient implementation of elliptic curve cryptosystems
by: Tan, Peng Chong.
Published: (2008) -
Implementation attacks on post-quantum lattice-based cryptography
by: Ravi, Prasanna
Published: (2023) -
Post-Quantum Cryptography
Published: (2017)