Reference Citations - HerongYang.com - v2.95, by Herong Yang
Enhancing security using ECC
'secp256r1 - For 256-Bit ECC Keys' tutorial was cited in the proceeding of ICRMIR conference in Mumbai, India in 2023.
The "secp256r1" - For 256-Bit ECC Keys tutorial was cited in the proceeding of "International Conference on Recent Trends in Multidisciplinary Research and Innovation" conference in Mumbai, India, in 2023.
Subject: Enhancing security using ECC
Date: 2023-03-17
Author: Smriti Gujjar, et al.
Source: https://ltce.in/assets/Final-proceeding-ICRMIR-2023.pdf
Abstract - The security, real-time performance, and other
shortcomings of the current encryption algorithms have led to
the development of several new encryption-decryption methods
by researchers. One of them is elliptic curve cryptography
(ECC), which is developing into a significant encryption
algorithm and has the potential to replace RSA
(Rivest-Shamir-Adleman). The main benefit of ECC over RSA
is that it provides equivalent security with a smaller key size,
which lowers processing cost. Recent research in the field of
cryptography has focused on elliptic curve cryptography.
...
REFERENCES
- ...
- ECC and RSA (Comparison),
https://www.gartner.com/security-endpoint-hardware-key-storage
- EC Cryptography (Algorithm),
https://www.herongyang.com/EC-Cryptography
/Curve-secp256r1-for256-Bit-ECC-Keys.html
- ECC Graph,
https://avinetworks.com/glossary/elliptic-curve-cryptography
- ...
Table of Contents
setup soap connector for comdata credit card services
Configure SOAP web services with Apache Camel
Hybrid Quantum Neural Network for Drug Response Prediction
PHP Soap request failed because of authentication error
Sonoma Safari Profile share passwords between profiles
Converting compressed WIF to uncompressed WIF