Downloads: 108
Research Paper | Mathematics | India | Volume 3 Issue 6, June 2014
Two-Party Authenticated Key Agreement Protocol in Elliptic Curve Cryptography
Vinod Kumar [37] | Adesh Kumari [2]
Abstract: In this paper; we are taken non singular elliptic curve which is depends on prime finite field. Accomplishment of existing public-key algorithms; comparable to Diffie-Hellman; using elliptic curves. In addition; the paper has been conventional two party authenticated key agreement protocol in elliptic curve cryptography (ECC). In this protocol; two users communicate to each other and generate secure session key. Furthermore; the paper shows the security analysis of this protocol on a secure communicated channel.
Keywords: Elliptic Curve Cryptography, Identity based Cryptosystem, Private Key generator Mutual Authentication
Edition: Volume 3 Issue 6, June 2014,
Pages: 587 - 589
Similar Articles with Keyword 'Elliptic'
Downloads: 0
Research Paper, Mathematics, India, Volume 11 Issue 5, May 2022
Pages: 871 - 872Generalization of the Group Classification with Application of Elliptic Partial Differential Equations
Mani Sharma [3] | Dr. Chitra Singh [6]
Downloads: 8
Research Paper, Mathematics, Uganda, Volume 10 Issue 9, September 2021
Pages: 1662 - 1692