سیویلیکا را در شبکه های اجتماعی دنبال نمایید.

Efficient method for remote authentication based on Elliptic Curve Cryptography

Publish Year: 1392
Type: Conference paper
Language: English
View: 942

This Paper With 6 Page And PDF Format Ready To Download

Export:

Link to this Paper:

Document National Code:

ISCEE16_335

Index date: 12 July 2014

Efficient method for remote authentication based on Elliptic Curve Cryptography abstract

In recent years, the design method for authentication of mobile devices is a challenging problem. Due to the memory constraints and low computing power of mobile devices now,Elliptic Curve Cryptography-based schemes use for remoteauthentication is taken into consideration. The reason for thischoice is that Elliptic Curve Cryptography modes have for keylength and less computationally expensive than other schemessuch as, RSA or even Pairing Bilinear pairing. The primaryschemes for authentication based on Elliptic Curvecryptography, authentication and key distribution wouldestablish two-way. Yang proposed a mutual authenticationmethod first, but then other researchers have questioned thesafety of this procedure. In this paper it will be shown thatseparating security problems, there are some structuralproblems in the method of Yang. Then remove the objection, theproposed method will not only eliminate security problems andstructural, but in terms of the computational cost would be moreefficient.

Efficient method for remote authentication based on Elliptic Curve Cryptography Keywords:

Efficient method for remote authentication based on Elliptic Curve Cryptography authors

Ali zahe

Masters

Morteza nikooghadam

Assistant Professor

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
ElGamal, T., A public key cryptosystem and a signature scheme ...
authentication with smart cards on open distributed system from elliptic ...
Jia, Z., Zhang, Y., Shao, H., Lin, Y., Wang, J., ...
_ Student Conference on Electrical Engineering Islamic Azad University of ...
environment based on ECC. Article in press Information Fusion, 2013. ...
نمایش کامل مراجع