research paper-computer science-cryptography





cryptography-2014
cryptography-research-papers-2011
Quantum cryptography
2012-cryptography

cryptography-research-papers-22

cryptography-research-papers-21

research-paper-and-project-in-cryptography-15

research-paper-and-project-in-cryptography-14

research-paper-and-project-in-cryptography-13

research-paper-and-project-in-cryptography-12

research-paper-and-project-in-cryptography-11

cryptography-research-papers-13

cryptography-research-papers-12

cryptography-research-papers-11

quantum-cryptography-63

decoy-state quantum-cryptography

free-space quantum-key-distribution

information-leakage-in-quantum-cryptography

experimental quantum-cryptography-2

experimental quantum-cryptography

cryptography-for network-security

medical-images-by-steganocryptography

visual-cryptography

visual-cryptography-2

visual-cryptography-3

visual-cryptography-4

visual-cryptography-5

steganography-cryptography-system

quantum-cryptography-real-implementation-problems

counter-factual quantum-cryptography

counter-factual quantum-cryptography-2

applications-to quantum-cryptography

metropolitan quantum-cryptography-network

hacking-commercial quantum-cryptography-systems

free-space-quantum-cryptography

quantum-cryptography-system-for-telecom-fiber-networks

perfect-eavesdropping-on-a quantum-cryptography-system

entropic-security-in quantum-cryptography

tolerable-error-rates-in quantum-cryptography

quantum-cryptography-as-a-retrodiction-problem

position-based quantum-cryptography

position-based quantum-cryptography-2

on-the-power-of-two-party quantum-cryptography

experimental quantum-cryptography-scheme-based-on-orthogonal-states

post-quantum-cryptography-lattice-signatures

algorithm-in quantum-cryptography

optimal-strategy-in quantum-cryptography

classical-and quantum-cryptography-services

single-photon-sources-for quantum-cryptography

distinguishability-of-gaussian-states-in quantum-cryptography-using-postselection

quantum-cryptography-04

quantum-cryptography-3

quantum-cryptography-3-2

verification-of quantum-cryptography-protocols-by-model-checking

introduction-to-post-quantum-cryptography

prototype-of-a quantum-cryptography-system-for-the-end-user

key-to-secure quantum-cryptography

towards-practical quantum-cryptography

quantum-cryptography-in-real-life-applications

cryptography-code-based-signatures

quantum-cryptography-aspects

new quantum-cryptography-protocols

quantum-cryptography-02

quantum-cloning-transformations-for quantum-cryptography

logic-functions-for cryptography a-tutorial

finite-field-multiplication-combining-amns-and-dft-approach-for-pairing cryptography

blind-source-separation-based cryptography-scheme-for-mobile-military-communication-applications

secure-localization-using-elliptic-curve cryptography-in-wireless-sensor-networks

iris-biometric cryptography-for-identity-document

algebraic-visual cryptography-scheme-for-color-images

symmetric-extendibility-for-qudits-and-tolerable-error-rates-in-quantum cryptography

provable-security-for-physical cryptography

provable-security-for-physical cryptography-2

lightweight cryptography-and-rfid-tackling-the-hidden-overheads

pseudo-dna cryptography-method

public-key cryptography-based-privacy-preserving-multi-context-rfid-infrastructure

on-the-security-of-1024-bit-rsa-and-160-bit-elliptic-curve cryptography

channel-coding-as-a cryptography-enhancer

perfect-eavesdropping-on-a-quantum cryptography-system

cryptanalysis-of-a-computer cryptography-scheme-based-on-a-filter-bank

vulnerability-bounds-and-leakage-resilience-of-blinded cryptography-under-timing-attacks

colour-visual cryptography-schemes

high-speed-elliptic-curve cryptography-accelerator-for-koblitz-curves

strengthen-cloud-computing-security-with-federal-identity-management-using-hierarchical-identity-basedcryptography

non-malleable-extractors-and-symmetric-key cryptography-from-weak-secrets

non-malleable-extractors-and-symmetric-key cryptography-from-weak-secrets-2

security-bounds-for-quantum cryptography-with-finite-resources

complementarity-of-private-and-correctable-subsystems-in-quantum cryptography-and-error-correction

ultra-lightweight cryptography-for-resource-constrained-devices

efficient-public-key cryptography-in-the-presence-of-key-leakage

analysis-of-public-key cryptography-for-wireless-sensor-networks-security

endomorphisms-for-faster-elliptic-curve cryptography-on-a-large-class-of-curves

cryptography-from-noisy-storage

general-theory-of-decoy-state-quantum cryptography-with-source-errors

on-lattices-learning-with-errors-random-linear-codes-and cryptography

de-finetti-representation-theorem-for-infinite-dimensional-quantum-systems-and-applications-to-quantum cryptography

continuous-variable-quantum cryptography-using-two-way-quantum-communication

practical-symmetric-key cryptography-on-modern-graphics-hardware

exploiting-the-power-of-gpus-for-asymmetric cryptography

on cryptography-with-auxiliary-input

leakage-resilient-public-key cryptography-in-the-bounded-retrieval-model

some-aspects-of-quantum-cryptography-and network-security

some-aspects-of-quantum-cryptography-and network-security-2

cryptography-for network-security-failures-successes-and-challenges

cryptography-research-papers-2011-section-3

cryptography-research-papers-2011-section-2

Related

elliptic curve cryptography-2013 research papers



A Survey of Low Power Elliptic Curve Cryptography for Smart Network
free download

ABSTRACT The proposed project is to implement a novel idea in Sensor networks. Normally Sensor networks are used to sense environment and collect data. Security in such networks is a big challenge. The first challenges of security in sensor networks lie in the conflicting 

PHYSIOLOGICAL VALUE BASED PRIVACY PRESERVATION OF PATIENT'S DATA USINGELLIPTIC CURVE CRYPTOGRAPHY
free download

Abstract Body Sensor Network (BSN) is a suitable combination of wearable tiny devices attached to patient's body. Their purpose is to monitor patient's physiological data (or BSN data) values. Sensors continuously monitor and collect patient's data and send it to a 

Efficient Encryption Scheme based on Elliptic Curve Cryptography (ECC) and Symmetric algorithm in Wireless Body Area Networks (WBANs)
free download

ABSTRACT. In this paper, we present efficient encryption scheme based on Elliptic Curve Cryptography (ECC) to protect patient's medical data in healthcare system. The proposed scheme used the symmetric cipher algorithm (ie, DES, modified Feistel algorithm, etc.) to 

Elliptic Curve Cryptography in Practice
free download

Abstract. In this paper, we perform a review of elliptic curve cryptography (ECC), as it is used in practice today, in order to reveal unique mistakes and vulnerabilities that arise in implementations of ECC. We study four popular protocols that make use of this type of 

DESIGN OF MOBILE PUBLIC KEY INFRASTRUCTURE (M-PKI) USING ELLIPTIC CURVE CRYPTOGRAPHY
free download

ABSTRACT Recently the demand of mobile phones and their applications are increasing rapidly and as a result, it becomes essential to design and/or improve the existing PKI (Public Key Infrastructure) useful for mobile phones or devices. Since a mobile phone has 

An Efficient Scalar Multiplication Algorithm for Elliptic Curve Cryptography Using a New Signed-Digit Representation
free download

Abstract. This paper presents and evaluates a novel encoding algorithm to reduce the Hamming weight of the scalar. The scalar multiplication is modified to utilize this new scalar representation. The results show that the computation cost (the number of required clock 

An Improved Remote User Authentication Scheme with Elliptic Curve Cryptography and Smart Card without using Bilinear Pairings
free download

ABSTRACT Login to the remote server over unreliable insecure network demands secured password a secured password authentication with less computational cost. We have proposed a remote user authentication scheme based on ECC that establish strong 

Fast Software Implementation of Binary Elliptic Curve Cryptography
free download

ABSTRACT. This paper presents an efficient and side channel protected software implementation of point multiplication for the standard NIST and SECG binary elliptic curves. The enhanced performance is achieved by improving the Lopez-Dahab/Montgomery 

Complete and Unified Group Laws are not Enough for Elliptic Curve Cryptography.
free download

ABSTRACT We analyze four recently proposed normal forms for elliptic curves. Though these forms are mathematically appealing and exhibit some cryptographically desirable properties, they nonetheless fall short of cryptographic viability, especially when 

Elliptic Curve Cryptography in Securing Networks by Mobile Authentication
free download

Abstract This paper proposes an enhanced authentication model, which is suitable for low- power mobile devices. It uses an Extended Password Key Exchange Protocols and elliptic-curve-cryptosystem based trust delegation mechanism to generate a delegation 

Prospective Utilization of Elliptic Curve Cryptography for Security Enhancement
free download

Abstract Now a days Elliptic curve cryptography (ECC) is the most efficient public key encryption scheme based on elliptic curve concepts that can be used to create faster, smaller, and efficient cryptographic keys. ECC generates keys through the properties of 

An Enhanced Opass With Modified Elliptic Curve Cryptography-Based User Authentication Scheme For Grid Computing
free download

ABSTRACT User authentication to an open server or a system based on username and password is familiar to access the control. Entering the username and password in an untruthful computer is impulse to avert from involuntary exposure through phishing, 

Binary Edwards Curves in Elliptic Curve Cryptography
free download

Edwards curves are a new normal form for elliptic curves that exhibit some cryptographically desirable properties and advantages over the typical Weierstrass form. Because the group law on an Edwards curve (normal, twisted, or binary) is complete and unified, 

Comprehensive Security System for Mobile Network Using Elliptic Curve Cryptography over GF (p)
free download

ABSTRACT Mobile devices have many differences in their capabilities, computational powers and security requirements. Mobile devices can be used as the enabling technology for accessing Internet based services, as well as for personal communication needs in 

CSE PROJECTS

FREE IEEE PAPER AND PROJECTS

FREE IEEE PAPER