A Comparative Study of Public Key Cryptosystem based on ECC and RSA
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 5
Abstract
The paper gives an introduction to the public key cryptography and its use in applications such as Key Agreement, Data Encryption and Digital Signature. The main emphasize is on some public key algorithms such as RSA and ECC along with the idea how ECC is better and more secure method of encryption in comparison to RSA and other asymmetric cryptosystems.
Authors and Affiliations
Arun kumar , Dr. S. S. Tyagi , Manisha Rana , Neha Aggarwal , Pawan Bhadana
A survey on Data Storage and Retrieval in Cloud Computing
This paper presents the survey on data storage and retrieval in cloud computing. In this paper the study on scope and security issues related to data storage and information retrieval in cloud computing is done. Data sto...
An analysis of cross avoidance techniques in optical multistage interconnection networks
It is expected that users of telecommunication services such as Internet, Web browsing, and tele-education will increase dramatically. This has greatly increased the demand for high bandwidth and high capacity communicat...
Deep Webpage Classification and Extraction (DWCE)
As the Deep web (or Hidden web) information is hidden behind the search query forms, this information can only be accessed by interacting with these forms. Therefore, development of automated system that interacts with t...
Zone Routing Protocol Using Anycast Addressing For Ad-Hoc Network
Zone Routing Protocol (ZRP) is a hybrid protocol that combines the advantages of both the proactive and reactive protocols. It is classified as: Intra Zone Routing, which uses hop count of the Nneighbors using proactive...
Fuzzy Optimal Solution to Fuzzy Transportation Problem: A New Approach
In this paper we propose a new algorithm for the initial fuzzy feasible solution to a fully fuzzy transportation problem. Then by using fuzzy version of modified distribution method, we obtain the fuzzy optimal solution...