A Review of Digital Signature Using Different Elliptic Cryptography Technique
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2016, Vol 15, Issue 8
Abstract
Authentication and verification of digital data is important phase in internet based transaction and data access. For the authentication and verification used digital signature operation. For the operation of digital signature various cryptography techniques is used. The strength of cryptography technique measures the strength of digital signature. For the strength improvement various cryptography techniques is used such as RSA, ECC and some other bit level cryptography technique. In this paper present the review of digital signature technique basically based on elliptic curve cryptography technique. The elliptic curve cryptography technique is much stronger than other cryptography technique.Â
Authors and Affiliations
Anurag Singh Bhadoria
Software Quality
In the given paper I present the information regarding quality metrics. Different quality factors can be imposing with relation to cost, schedule and rework. It’s very important to make quality assurance plans. For tha...
3-D from 2-D Using Warping Transformations .
Shown in this paper are methods on how to find the third dimension of a single image or from the two views of the image taking in a different angle using the method more accurate and faster to get to the third dimension...
TEDDEEC: Threshold Enhanced Developed Distributed Energy-Efficient Clustering Protocol for Heterogeneous Wireless Sensor Networks
In wireless sensor networks, hundreds or thousands of sensor networks are deployed in a field to sense data (like temperature, light, pressure, sound etc.) and then they transmit it to sink nodes or base station via a ra...
Impact of using Infinity-Norm with Initial Radius on Performance and Complexity of SD Algorithm in MIMO systems
 In recent years, the iterative decoding techniques have played a role in improving the performance (e.g., bit error rate) and reducing the complexity of various digital communication systems. Techniques of Multiple-Inp...
Multi-Agent System Overview: Architectural Designing using Practical Approach
A software agent should be autonomous, flexible, robust and social. The increasing importance of the Multi-Agent System (MAS) has led to the greater availability of tools designed to facilitate their creation and use. To...