Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "fff242ec-f010-44bb-a2aa-c27fd99907ab"}, "_deposit": {"id": "3362", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3362"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3362", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Implementation of Efficient Hybrid Encryption Based on Elliptic Curve", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "This paper implements an efficient hybridencryption that combines symmetric key encryption,one time pad (OTP) and asymmetric key encryption,Elliptic Curve Cryptography (ECC). Elliptic CurveKey Establishment Protocol (ECKEP) is used togenerate session key. Elliptic Curve EncryptionScheme (ECES) is used to encrypt and decryptsession key. One time pad algorithm has the keydistribution problem, but it can operate at the highspeed. Elliptic Curve Cryptography is used toencrypt OTP key for key security and to solve keydistribution problem. This cryptographic primitivesimultaneously performs the functions of both entityauthentication and data encryption. Thiscryptographic primitive provides confidentiality,unforgeability, and non-repudiation for the delivereddata simultaneously. It is intended for securityintensive applications."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "ECC"}, {"interim": "ECES"}, {"interim": "ECKEP"}, {"interim": "OTP"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-22"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "psc2010paper (184).pdf", "filesize": [{"value": "64 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 64000.0, "url": {"url": "https://meral.edu.mm/record/3362/files/psc2010paper (184).pdf"}, "version_id": "a5c7d7c6-285c-42ed-bf7d-9b65fb141552"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Aung, Ywel Nandi"}, {"subitem_authors_fullname": "Chan, Khin Ei Ei"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2010-12-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1120"}, "item_title": "Implementation of Efficient Hybrid Encryption Based on Elliptic Curve", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003362", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-22"}, "publish_date": "2019-07-22", "publish_status": "0", "recid": "3362", "relation": {}, "relation_version_is_last": true, "title": ["Implementation of Efficient Hybrid Encryption Based on Elliptic Curve"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Implementation of Efficient Hybrid Encryption Based on Elliptic Curve

http://hdl.handle.net/20.500.12678/0000003362
http://hdl.handle.net/20.500.12678/0000003362
fe97bf22-bb0d-456a-a83e-e2fa1b04124a
fff242ec-f010-44bb-a2aa-c27fd99907ab
None
Preview
Name / File License Actions
psc2010paper psc2010paper (184).pdf (64 Kb)
Publication type
Article
Upload type
Publication
Title
Title Implementation of Efficient Hybrid Encryption Based on Elliptic Curve
Language en
Publication date 2010-12-16
Authors
Aung, Ywel Nandi
Chan, Khin Ei Ei
Description
This paper implements an efficient hybridencryption that combines symmetric key encryption,one time pad (OTP) and asymmetric key encryption,Elliptic Curve Cryptography (ECC). Elliptic CurveKey Establishment Protocol (ECKEP) is used togenerate session key. Elliptic Curve EncryptionScheme (ECES) is used to encrypt and decryptsession key. One time pad algorithm has the keydistribution problem, but it can operate at the highspeed. Elliptic Curve Cryptography is used toencrypt OTP key for key security and to solve keydistribution problem. This cryptographic primitivesimultaneously performs the functions of both entityauthentication and data encryption. Thiscryptographic primitive provides confidentiality,unforgeability, and non-repudiation for the delivereddata simultaneously. It is intended for securityintensive applications.
Keywords
ECC, ECES, ECKEP, OTP
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/1120
Journal articles
Fifth Local Conference on Parallel and Soft Computing
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 10:00:50.621027
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL