42
Views
7
CrossRef citations to date
0
Altmetric
Articles

Competing secure text encryption in intranet using elliptic curve cryptography

&

References

  • Keerthi K, Dr. B. Surendiran, “Elliptic Curve Cryptography for Secured Text Encryption”. 2017 International Conference on circuits Power and Computing Technologies [ICCPCT], 2017 IEEE.
  • A Arjuna Rao, K Sujatha, A Bhavana Deepthi, L V Rajesh, “Survey paper comparing ECC with RSA, AES and Blowfish Algorithms” International Journal on Recent and Innovation Trends in Computing and Communication Volume: 5, Issue: 1, IJRITCC, January 2017.
  • Amrita Jain, Vivek Kapoor “Policy for Secure Communication using Hybrid Encryption Algorithm” published in International Journal of Computer Applications (0975-8887), Volume 125-No.10, September 2015. doi: 10.5120/ijca2015906035
  • Seyed Mohammad Seyedzade, Reza Ebrahimi Atani and Sattar Mirzakuchaki, “A Novel Image Encryption Algorithm Based on Hash Function”, 6th Iranian Conference on Machine Vision and Image Processing, 2010.
  • Amrita Jain, Vivek Kapoor “Secure Communication using RSA Algorithm for Network Environment” published in International Journal of Computer Applications (0975-8887), Volume 118-No.7, May 2015. doi: 10.5120/20755-3153
  • Milind Mathur, Ayush Kesarwani, “Comparison between DES, 3DES, RC2, RC6, BLOWFISH and AES”. Proceedings of National Conference on New Horizons in IT – NCNHIT 2013.
  • Shanthi, and Dr. V Palanswami “Novel Text To Image Encryption Technique by using by AES Rejindael Algorithm with color code conversion”, in International Journal of Engineering Trends and Technology (IJETT) – Volume 13 Number 5 – Jul 2014.
  • V. Kapoor, Rahul Yadav “A Hybrid Cryptography Technique for Improving Network Security” published in International Journal of Computer Applications (0975-8887), Volume 141-No.11, May 2016. doi: 10.5120/ijca2016909863
  • Adesh Kumari, M. Yahya, Abbasi, Vinod Kumar, Akbar Ali Khan, A secure user authentication protocol using elliptic curve cryptography, Journal of Discrete Mathematical Science and Cryptography 22 (4) 521-530(2019). Doi:10.1080/09720529.2019.1637155.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.