posted on 2023-05-23, 04:50authored byBalitanas, MO, Robles, R, Kim, N, Kim, TH
Attaining security through cryptography techniques can be puzzling. A large and potentially confusing variety of security solutions are built from a relatively small number of primitive cryptographic components. It is widely recognized however; that data security will play a crucial role in modern times for business will be transacted over the internet and even to wireless devices. This paper presents a cross crypto-scheme that combines both symmetric algorithm of AES and the asymmetric algorithm of elliptic curve cryptography (ECC).
History
Publication title
Symposium on Bio-Inspried Learning and Intelligent Systems for Security (BLISS 2009)