DocumentCode :
2482267
Title :
Elliptic Curve Cryptography in Constrained Environments: A Review
Author :
Pateriya, R.K. ; Vasudevan, Shreeja
Author_Institution :
Comput. Sci. & Inf. Tech. Dept., Maulana Azad Nat. Inst. of Technol., Bhopal, India
fYear :
2011
fDate :
3-5 June 2011
Firstpage :
120
Lastpage :
124
Abstract :
In order to provide security in constrained environments, Public Key cryptography is being used extensively. Elliptic Curve Cryptography (ECC) is one of the best Public Key encryption techniques. ECC uses smaller key sizes compared to traditionally used RSA based cryptosystems for nearly the same security status. ECC offers great potential for the future research due to the ever growing demand for compaction of the devices and load balancing for environments where there are memory, bandwidth and computational constrains.
Keywords :
bandwidth allocation; computational complexity; public key cryptography; resource allocation; storage allocation; ECC; RSA based cryptosystems; bandwidth constraints; computational constraints; constrained environments; elliptic curve cryptography; load balancing; memory constraints; public key cryptography; public key encryption techniques; security status; Authentication; Elliptic curve cryptography; Elliptic curves; Protocols; Constrained environments; ECC; RSA;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communication Systems and Network Technologies (CSNT), 2011 International Conference on
Conference_Location :
Katra, Jammu
Print_ISBN :
978-1-4577-0543-4
Electronic_ISBN :
978-0-7695-4437-3
Type :
conf
DOI :
10.1109/CSNT.2011.32
Filename :
5966418
Link To Document :
بازگشت