Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Samta Gajbhiye"'
Publikováno v:
Journal of Information Security and Applications. 44:170-183
Bluetooth version 5.0 introduced flexibility in SSP pairing protocol. It introduced P-192 elliptic curve for devices that support all versions before 4.0 and P-256 elliptic curve for devices that support 4.0, 4.1, 4.2, and 5.0 versions. Despite enhan
Publikováno v:
Information Security Journal: A Global Perspective. 27:42-56
Secure Simple Pairing, a Bluetooth-pairing protocol, suffers from passive off-line and active online-guessing attack. These assaults are a direct result of the shortcomings in Bluetooth specification. Bluetooth technology uses the principles of devic
Publikováno v:
Journal of Information Security and Applications. 35:44-50
Secure Simple Pairing protocol of Bluetooth introduced in Bluetooth version 2.1+EDR has security issues. Shared secret key using Elliptic Curve Diffie–Hellman algorithm generated in public key exchange phase, is subsequently used for authentication
Publikováno v:
2017 International Conference on Intelligent Sustainable Systems (ICISS).
Cryptography is the technique of masking the message by means of any encryption method so that intended entity can decrypt the contents. Cryptanalysis is the art of retrieving plain text from cipher text with no prior information about technique or k
Publikováno v:
International Journal of Computer Applications. 129:25-27
Since the invention of public -key cryptography, numerous public -key cryptographic systems have been proposed. Each of these systems relies on a difficult mathematical problem for its security. Today, three types of systems, classified according to
Publikováno v:
ICACCI
Secure Simple Pairing (SSP), a characteristic of the Bluetooth Core Version 2.1 specification was build to address two foremost concerns amongst the Bluetooth user community: security and simplicity of the pairing process. It utilizes Elliptic Curve
Publikováno v:
International Journal of Computer Applications. 47:32-38
Public key cryptography systems are based on sound mathematical foundations that are designed to make the problem hard for an intruder to break into the system. Number theory and algebraic geometry, namely the theory of elliptic curves defined over f
Autor:
Samta Gajbhiye, Dipti Aglawe
Publikováno v:
International Journal of Computer Applications. 42:43-48
of products and standards that use public-key cryptography for encryption and digital signature use RSA. The key length for secure RSA has increased over recent years ,and this has put heavier processing load on applications using RSA. Recently, a co
Publikováno v:
i-manager's Journal on Software Engineering. 1:70-74
Publikováno v:
International Journal of Electrical and Computer Engineering (IJECE). 1
The paper presents an extensive and careful study of elliptic curve cryptography (ECC) and its applications. This paper also discuss the arithmetic involved in elliptic curve and how these curve operations is crucial in determining the performance of