A Review of Digital Signature Using Different Elliptic Cryptography Technique

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2016, Vol 15, Issue 8

Abstract

Authentication and verification of digital data is important phase in internet based transaction and data access. For the authentication and verification used digital signature operation. For the operation of digital signature various cryptography techniques is used. The strength of cryptography technique measures the strength of digital signature. For the strength improvement various cryptography techniques is used such as RSA, ECC and some other bit level cryptography technique. In this paper present the review of digital signature technique basically based on elliptic curve cryptography technique. The elliptic curve cryptography technique is much stronger than other cryptography technique. 

Authors and Affiliations

Anurag Singh Bhadoria

Keywords

Related Articles

Web Client and Web Server approaches to Prevent XSS Attacks

Websites rely completely on complex web applications to deliver content to all users according to set preferences and specific needs. In this manner organizations provide better value to their customers and prospects. Dy...

Load-Balancing using HA Proxy on Multipath System with Flow Slice

To provide switching capacity in terabit or petabit uses core routers in multipath switching systems (MPS). Without disturbing the order of intra flow packets, the load balance across multiple paths is the main issue of...

POWER SAVING LOAD BALANCING STRATEGY USING DVFS IN CLOUD ENVIRONMENT

Cloud Computing is a technology that provides a platform for the sharing of resources such as software, infrastructure, application and other information. Cloud Computing is being used widely all over the world by many I...

Comparative Analysis of Various Cloud Technologies

With the increasing prevalence and demand of large scale cloudcomputing environment, a researcher has to draw more attentiontowards the services provided by the CLOUD. As the access tothe server is increasing, centralize...

Fingerprint Database Variations for WiFi Positioning

Indoor positioning systems calculate the position of a mobile device (MD) in an enclosed environment with relative precision. Most systems use WiFi infrastructure and several positioning techniques, where the most common...

Download PDF file
  • EP ID EP650838
  • DOI 10.24297/ijct.v15i8.1499
  • Views 92
  • Downloads 0

How To Cite

Anurag Singh Bhadoria (2016). A Review of Digital Signature Using Different Elliptic Cryptography Technique. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 15(8), 6976-6978. https://europub.co.uk/articles/-A-650838