{"created":"2020-09-01T10:00:48.958486+00:00","id":3362,"links":{},"metadata":{"_buckets":{"deposit":"fff242ec-f010-44bb-a2aa-c27fd99907ab"},"_deposit":{"id":"3362","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3362"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3362","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Implementation of Efficient Hybrid Encryption Based on Elliptic Curve","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"This paper implements an efficient hybridencryption that combines symmetric key encryption,one time pad (OTP) and asymmetric key encryption,Elliptic Curve Cryptography (ECC). Elliptic CurveKey Establishment Protocol (ECKEP) is used togenerate session key. Elliptic Curve EncryptionScheme (ECES) is used to encrypt and decryptsession key. One time pad algorithm has the keydistribution problem, but it can operate at the highspeed. Elliptic Curve Cryptography is used toencrypt OTP key for key security and to solve keydistribution problem. This cryptographic primitivesimultaneously performs the functions of both entityauthentication and data encryption. Thiscryptographic primitive provides confidentiality,unforgeability, and non-repudiation for the delivereddata simultaneously. It is intended for securityintensive applications."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"ECC"},{"interim":"ECES"},{"interim":"ECKEP"},{"interim":"OTP"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-22"}],"displaytype":"preview","filename":"psc2010paper (184).pdf","filesize":[{"value":"64 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3362/files/psc2010paper (184).pdf"},"version_id":"a5c7d7c6-285c-42ed-bf7d-9b65fb141552"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Fifth Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Aung, Ywel Nandi"},{"subitem_authors_fullname":"Chan, Khin Ei Ei"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2010-12-16"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1120"},"item_title":"Implementation of Efficient Hybrid Encryption Based on Elliptic Curve","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-22","publish_status":"0","recid":"3362","relation_version_is_last":true,"title":["Implementation of Efficient Hybrid Encryption Based on Elliptic Curve"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T00:33:31.596511+00:00"}