Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

An Novel Key Cryptography for Signature Depreciation in Wireless Sensor Networks


Affiliations
1 Department of Computer Science and Engineering, Anna University Regional Centre – Coimbatore, India
     

   Subscribe/Renew Journal


Koblitz introduced a family of curves which admit especially fast elliptic scalar multiplication. A Koblitz curve is an elliptic curve has convenient features for efficient implementation of elliptic curve cryptography. In order to enable faster computations, scalars need to be reduced and represented using a special base -expansion. Hence an efficient conversion algorithm is indeed which utilize only simple operations such as additions and shifts. It is an attractive class of elliptic curves because they offer faster scalar multiplications. It is also the most demanding operation due to its efficient computation which is widely used in practical cryptosystems.

Keywords

Koblitz Curve, Elliptic Curves, Public-Key Cryptography, Scalar Multiplications, Broadcast Authentication.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 149

PDF Views: 3




  • An Novel Key Cryptography for Signature Depreciation in Wireless Sensor Networks

Abstract Views: 149  |  PDF Views: 3

Authors

P. Prema
Department of Computer Science and Engineering, Anna University Regional Centre – Coimbatore, India
J. Preethi
Department of Computer Science and Engineering, Anna University Regional Centre – Coimbatore, India

Abstract


Koblitz introduced a family of curves which admit especially fast elliptic scalar multiplication. A Koblitz curve is an elliptic curve has convenient features for efficient implementation of elliptic curve cryptography. In order to enable faster computations, scalars need to be reduced and represented using a special base -expansion. Hence an efficient conversion algorithm is indeed which utilize only simple operations such as additions and shifts. It is an attractive class of elliptic curves because they offer faster scalar multiplications. It is also the most demanding operation due to its efficient computation which is widely used in practical cryptosystems.

Keywords


Koblitz Curve, Elliptic Curves, Public-Key Cryptography, Scalar Multiplications, Broadcast Authentication.