{"created":"2020-09-01T13:47:36.278552+00:00","id":3937,"links":{},"metadata":{"_buckets":{"deposit":"c07a4d16-8ace-4027-ba2e-e8fe7698f83b"},"_deposit":{"id":"3937","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3937"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3937","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Key Generation Based on Elliptic Curve Cryptography","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"In the rapid improvement of communicationenvironment, it is desirable to improve the security measure onthe use of between the sender and receiver. Cryptography is animportant aspect of communications security and is also a basicbuilding block for computer security. Elliptic curve arithmeticcan be used to develop a variety of elliptic curve cryptograph(ECC) schemes, including key exchange, encryption and digitalsignature. In this paper, we propose a system that provides twousers to exchange secret keys securely on an unsecuredcommunication path. ECC is used to exchange a randomlygenerated conventional encryption key with keyed-hash messageauthentication code (HMAC) to generate dynamically the secretkey. The rest of the exchange is then encrypted message anddecrypted message are processed using Advanced EncryptionStandard (AES)."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-08-02"}],"displaytype":"preview","filename":"Key Generation Based on Elliptic Curve Cryptography.pdf","filesize":[{"value":"10 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3937/files/Key Generation Based on Elliptic Curve Cryptography.pdf"},"version_id":"85c799fa-d345-4f8c-8dc7-89931d1b7da9"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Third Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Kyi, Linn Htaik"},{"subitem_authors_fullname":"Mya, Khin Than"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2009-08-03"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1655"},"item_title":"Key Generation Based on Elliptic Curve Cryptography","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-08-02","publish_status":"0","recid":"3937","relation_version_is_last":true,"title":["Key Generation Based on Elliptic Curve Cryptography"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T00:50:05.615967+00:00"}