COMPARATIVE ANALYSIS OF MOD-ECDH ALGORITHM WITH VARIOUS ALGORITHMS
Cryptography is a well-known and well-researched topic for ages. Cryptography is the first line of defense for any networked system. By using Symmetric as well as Asymmetric Cryptography a lot of algorithms are developed. From the security point of view, Asymmetric Cryptography is more popular as se...
Saved in:
Published in: | International journal of industrial engineering & production research Vol. 31; no. 2; pp. 301 - 308 |
---|---|
Main Authors: | , |
Format: | Journal Article |
Language: | English |
Published: |
Iran University of Science & Technology
01-06-2020
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!