Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Survey Paper on: Elliptic Curve Cryptography

Author : Tejaswini R M 1

Date of Publication :7th May 2016

Abstract: Cryptography

Reference :

    1. C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou. Privacypreserving public auditing for secure cloud storage. IEEE Trans. Computers, 62(2):362–375, 2013
    2. C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou. Toward secure and dependable storage services in cloud computing. IEEE T.Services Computing, 5(2):220–232, 2012
    3. A. Akavia, S. Goldwasser, and V. Vaikuntanathan. Simultaneous hardcore bits and cryptography against memory attacks. In TCC, volume 5444 of Lecture Notes in Computer Science, pages 474–495. Springer, 2009
    4. A. Boldyreva, V. Goyal, and V. Kumar. Identity-based encryption with efficient revocation. In P. Ning, P. F. Syverson, and S. Jha, editors, ACM Conference on Computer and Communications Security, pages 417–426. ACM, 2008.
    5. S. S. Al-Riyami and K. G. Paterson. Certificateless public key cryptography. In ASIACRYPT, volume 2894 of Lecture Notes in Computer Science, pages 452–473. Springer, 2003

    1. J. J. Amador and R.W. Green, Symmetric-Key Block Cipher
    2. Image and Text Cryptography, International Journal of Imaging and Technology, Vol. 15, No. 3, pp. 178-188, 2005.
    3. Ting Liu, Member, IEEE, YangLiu, YashanMao, Yao Sun, XiaohongGuan, Fellow, IEEE, Weibo Gong, Fellow, IEEE, and Sheng Xiao “A Dynamic Secret-Based Encryption Scheme for Smart Grid Wireless Communication” IEEE Trans. Smart Grid vol. 5, no. 3, may 2014
    4. K. Ren, Z. Li, and R. C. Qiu, “Guest editorial cyber, physical, and system security for smart grid,” IEEE Trans. Smart Grid, vol. 2, pp. 643– 644, 2011
    5. P. McDaniel and S. McLaughlin, “Security and privacy challenges in the smart grid,” IEEE Security Privacy, vol. 7, pp. 75–77, 2009
    6. L. Fengjun, L. Bo, and L. Peng, “Secure information aggregation for smart grids using homomorphic encryption,” in Proc. 2010 1st IEEE Int. Conf. Smart Grid Commun. (SmartGridComm), pp. 327–332.
    7. R. Metke and R. L. Ekl, “Security technology for smart grid networks,” IEEE Trans. Smart Grid, vol. 1, pp. 99– 107, 2010
    8. W. Dapeng and Z. Chi, “Fault-tolerant and scalable key management for smart grid,” IEEE Trans. Smart Grid, vol. 2, pp. 375–381, 2011
    9. H. Li, S. Gong, L. Lai, Z. Han, R. Q. Qiu, and D. Yang, “Efficient and secure wireless communications for advanced metering infrastructure in smart grids,” IEEE Trans. Smart Grid, vol. 3, pp. 1540–1551, 2012
    10. L. Rongxing, L. Xiaohui, L. Xu, L. Xiaodong, and S. Xuemin, “EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications,” IEEE Trans. Parallel Distrib. Syst., vol. 23, pp. 1621–1631, 2012

Recent Article