Search Results - Elliptic curve Diffie-Hellman algorithm

Refine Results
  1. 1

    Implementing Enhanced Security in the Zigbee Joining Process Using Elliptic Curve DiffieHellman Algorithm by Gwata, Ngonidzashe, Balyan, Vipin

    ISSN: 2619-9831, 2619-9831
    Published: İstanbul University-Cerrahpasa 01.09.2024
    Published in Electrica (01.09.2024)
    “… To address this issue, an enhancement is proposed, which focuses on reinforcing security during key transportation by integrating Elliptic Curve DiffieHellman (ECDH…”
    Get full text
    Journal Article
  2. 2

    A new RGB image encryption algorithm based on DNA encoding and elliptic curve DiffieHellman cryptography by Kumar, Manish, Iqbal, Akhlad, Kumar, Pranjal

    ISSN: 0165-1684, 1872-7557
    Published: Elsevier B.V 01.08.2016
    Published in Signal processing (01.08.2016)
    “…) diversified with DNA encoding. The algorithm first encodes the RGB image using DNA encoding followed by asymmetric encryption based on Elliptic Curve DiffieHellman Encryption (ECDHE…”
    Get full text
    Journal Article
  3. 3
  4. 4

    File Encryption and Decryption Application using Elliptic Curve Diffie-Hellman Algorithm and Chaotic Map Function by Heru, Albert Toshiro, Faisal, Manalu, Sonya Rapinta

    ISSN: 1877-0509, 1877-0509
    Published: Elsevier B.V 2024
    Published in Procedia computer science (2024)
    “… it. One frequently exchanged form of information is files. In this research, we employed the Elliptic Curve Diffie-Hellman and chaotic map function algorithms to secure files…”
    Get full text
    Journal Article
  5. 5

    Fuzzy Genetic Elliptic Curve Diffie Hellman Algorithm for Secured Communication in Networks by Sethuraman, Priya, Tamizharasan, P. S., Arputharaj, Kannan

    ISSN: 0929-6212, 1572-834X
    Published: New York Springer US 15.04.2019
    Published in Wireless personal communications (15.04.2019)
    “… In order to reduce the overhead involved in the computation of less powerful mobile devices the fuzzy genetic elliptic curve Diffie Hellman is proposed in this paper…”
    Get full text
    Journal Article
  6. 6
  7. 7

    Multiple RGB images encryption algorithm based on elliptic curve, improved Diffie Hellman protocol by Bashir, Zia, Malik, M. G. Abbas, Hussain, Muhammad, Iqbal, Nadeem

    ISSN: 1380-7501, 1573-7721
    Published: New York Springer US 01.01.2022
    Published in Multimedia tools and applications (01.01.2022)
    “…For the asymmetric key, the Diffie Hellman Key (DHK) protocol is very efficient, but sometimes it is vulnerable against brute force attacks if the parameters are not chosen carefully…”
    Get full text
    Journal Article
  8. 8

    COMPARATIVE ANALYSIS OF MOD-ECDH ALGORITHM WITH VARIOUS ALGORITHMS by O Sri Nagesh, Vankamamidi S Naresh

    ISSN: 2008-4889, 2345-363X
    Published: Iran University of Science & Technology 01.06.2020
    “… Elliptic Curve Cryptography (ECC) provides similar security having less key size among them. In the present paper, an improved MOD-ECDH has been proposed…”
    Get full text
    Journal Article
  9. 9

    COMPARATIVE ANALYSIS OF MOD-ECDH ALGORITHM WITH VARIOUS ALGORITHMS by O Sri Nagesh, Vankamamidi S Naresh

    ISSN: 2008-4889, 2345-363X
    Published: Iran University of Science & Technology 01.06.2020
    “… Elliptic Curve Cryptography (ECC) provides similar security having less key size among them. In the present paper, an improved MOD-ECDH has been proposed…”
    Get full text
    Journal Article
  10. 10

    Steganography Using Improved Diffie Hellman Algorithm and Elliptic Curve Cryptography by S, Vijitha, R, Anandan, P, Prasanna

    Published: IEEE 27.03.2025
    “… This paper proposes a novel steganographic framework that integrates the Improved Diffie-Hellman Algorithm (IDHA…”
    Get full text
    Conference Proceeding
  11. 11

    CTEA: Chaos based tiny encryption algorithm using ECDH and TinkerBell map for data security in supply chain management by Kumbhakar, Dulal, Adhikari, Subhajit, Karforma, Sunil

    ISSN: 1573-7721, 1380-7501, 1573-7721
    Published: New York Springer US 01.04.2025
    Published in Multimedia tools and applications (01.04.2025)
    “… For the purpose of data security in SCM environment, a novel Chaos based Tiny Encryption Algorithm named as CTEA is designed with the help of Elliptic Curve DiffieHellman (ECDH…”
    Get full text
    Journal Article
  12. 12

    Enhancing security in Wireless Body Area Networks (WBANs) with ECC-based Diffie-Hellman Key Exchange algorithm (ECDH) by S S, Akilan, Devprasad, Kayathri Devi, J, Raja Sekar

    ISSN: 1878-7401, 1878-7401
    Published: United States 08.11.2024
    Published in Technology and health care (08.11.2024)
    “… This study explores the application of the Elliptic Curve Cryptography (ECC)-based Diffie-Hellman Key Exchange (ECDH…”
    Get more information
    Journal Article
  13. 13

    Implementation of ChaCha20 Algorithm with Elliptic-Curve-Diffie-Hellman in Server Room Monitoring System to Prevent MITM and Reused Key Attack by Alam, Danang Enggar Risyaf, Al Fitrah, Habib, Ayunasari, Malika, Ogi, Dion

    Published: IEEE 22.08.2023
    “… The system implements the ChaCha20 algorithm with the HTTP protocol. This algorithm tends to use the same key every time it is implemented, so in this study, additions…”
    Get full text
    Conference Proceeding
  14. 14

    A Well-Organized Safeguarded Access on Key Propagation by Malleable Optimization in Blend With Double Permutation by Sathish, A, Ravimaran, S, Kumar, S Jerald Nirmal

    ISSN: 1545-7362, 1546-5004
    Published: Hershey IGI Global 01.01.2020
    “…) technique along with an adaptive optimization algorithm for password generation and performing double permutation…”
    Get full text
    Journal Article
  15. 15

    Elliptic curve DiffieHellman cryptosystem in big data cloud security by Subramanian, E. K., Tamilselvan, Latha

    ISSN: 1386-7857, 1573-7543
    Published: New York Springer US 01.12.2020
    Published in Cluster computing (01.12.2020)
    “… The proposed system uses an Elliptic curve with DiffieHellman (ECDH) algorithm for encryption and decryption of data to improve the data security in the cloud…”
    Get full text
    Journal Article
  16. 16

    Hadoop-based Secure Storage Solution for Big Data in Cloud Computing Environment using Elliptical Curve Diffie - Hellman Algorithm by Murugesan, Prakash, Arun Kakumanu, Venkata

    Published: IEEE 26.07.2024
    “… In this research, the Elliptic Curve-Diffie-Helman (ECDH) algorithm is implemented to increase the encryption process and reduce the computation amount…”
    Get full text
    Conference Proceeding
  17. 17

    Hybrid blowfish cryptography with elliptic curve Diffie-Hellman key exchange protocol for enhancing data security and performance by Saravanan, K. Vignesh, Priya, G. Sakthi

    ISSN: 2948-1600, 2948-1600
    Published: Cham Springer International Publishing 27.05.2025
    Published in Discover Electronics (27.05.2025)
    “…) was employed with Elliptic Curve Diffie-Hellman (ECDH) key. The hybrid algorithm uses Blowfish and AES with ECDH encryption techniques to encrypt and decrypt datasets…”
    Get full text
    Journal Article
  18. 18

    EECDH to prevent MITM attack in cloud computing by Anand, Shajina, Perumal, Varalakshmi

    ISSN: 2352-8648, 2352-8648
    Published: Elsevier B.V 01.11.2019
    Published in Digital communications and networks (01.11.2019)
    “… This paper addresses the issues faced by multiple owners through a mutual authentication mechanism using the Enhanced Elliptic Curve Diffie - Hellman (EECDH…”
    Get full text
    Journal Article
  19. 19

    An identity attribute–based encryption using elliptic curve digital signature for patient health record maintenance by Athena, J., Sumathy, V., Kumar, K.

    ISSN: 1074-5351, 1099-1131
    Published: Chichester Wiley Subscription Services, Inc 25.01.2018
    “… So this work implemented the efficient techniques, namely, elliptic curve DiffieHellman for the secret key generation and identity attribute…”
    Get full text
    Journal Article
  20. 20

    Conversion of the Diffie-Hellman Key Exchange Algorithm Based on Elliptic Curve Equations to Elliptic Curve Equations with Private Parameters by Ahmedova, Oydin, Khudoykulov, Zarif, Mardiyev, Ulugbek, Ortiqboyev, Akbar

    Published: IEEE 03.11.2021
    “… This article presents a method for converting elliptic curve equations to hidden parameter elliptic curve equations to increase stability without increasing key length…”
    Get full text
    Conference Proceeding