Elliptic Curve Public-Key Cryptosystem Over Z(i)
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2012, Vol 3, Issue 4
Abstract
A method to implement elliptic curve public-key cryptosystem over Z(i) is discussed. The method is in fact the same as the technique that works on Galois fields but here works on Z(i). The curve under Z(i) generates more points as compared to the curve under Galois fields. The security of the system is better due to more number of points on the curve. But there are some difficulties in the new system and through this paper; we try to discuss some of the pitfalls of the new system.
Authors and Affiliations
Soram Ranbir Singh , Khomdram Memeta Chanu
A Brief Introduction of Different type of Security Attacks found in Mobile Ad-hoc Network
A structure less network is called the mobile ad-hoc network, where all the nodes are independent. In MANET, there is a collection of mobile nodes that from temporary network. Those nodes are act like a host or like a ro...
Secret Detection of Sensitive Data Leakage
Surveys from many years have shown that many data leakages has been found due different problems like malicious attacks, hacking, different attacks. Approximately 28% of all data leakages are due to human mistakes which...
Modified Suffix Search Algorithm for Multiple String Matching
String Matching is now a prominent field in the area of Computer Science and it has many applications in the real world. A new algorithm for Suffix Search which uses chained hashing is proposed and this works well in mat...
Comparing the Testing Approaches of Traditional, Object-Oriented and Agent- Oriented Software System
Testing is one of the important and indispensable activities of software development life cycle. Software testing makes sure that the developed software satisfies all the customer requirements and executes without error....
A Secure Image Steganography Method Based on Neural Network
Steganography is the term used to describe the hiding of data in images to avoid detection by attackers. Steganalysis is the method used by attackers to determine if images have hidden data and to recover that data. By m...