COMPARATIVE ANALYSIS OF MOD-ECDH ALGORITHM WITH VARIOUS ALGORITHMS

Cryptography is a well-known and well-researched topic for ages. Cryptography is the first line of defense for any networked system. By using Symmetric as well as Asymmetric Cryptography a lot of algorithms are developed. From the security point of view, Asymmetric Cryptography is more popular as se...

Full description

Saved in:
Bibliographic Details
Published in:International journal of industrial engineering & production research Vol. 31; no. 2; pp. 301 - 308
Main Authors: O Sri Nagesh, Vankamamidi S Naresh
Format: Journal Article
Language:English
Published: Iran University of Science & Technology 01-06-2020
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first