![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
An Novel Key Cryptography for Signature Depreciation in Wireless Sensor Networks
Subscribe/Renew Journal
Koblitz introduced a family of curves which admit especially fast elliptic scalar multiplication. A Koblitz curve is an elliptic curve has convenient features for efficient implementation of elliptic curve cryptography. In order to enable faster computations, scalars need to be reduced and represented using a special base -expansion. Hence an efficient conversion algorithm is indeed which utilize only simple operations such as additions and shifts. It is an attractive class of elliptic curves because they offer faster scalar multiplications. It is also the most demanding operation due to its efficient computation which is widely used in practical cryptosystems.
Keywords
Koblitz Curve, Elliptic Curves, Public-Key Cryptography, Scalar Multiplications, Broadcast Authentication.
User
Subscription
Login to verify subscription
Font Size
Information
![](https://i-scholar.in/public/site/images/abstractview.png)
Abstract Views: 265
![](https://i-scholar.in/public/site/images/pdfview.png)
PDF Views: 3