z-logo
open-access-imgOpen Access
CRYPTOGRAPHIC KEY COMMUNICATION PROTOCOL USING ELLIPTIC CURVE OVER FINITE FIELD WITH NESTED CONSTRUCTION OF HASH MESSAGE AUTHENTICATION CODE
Author(s) -
P. Sirisha
Publication year - 2018
Publication title -
international journal of advanced research in computer science
Language(s) - English
Resource type - Journals
ISSN - 0976-5697
DOI - 10.26483/ijarcs.v9i1.5304
Subject(s) - computer science , hash function , cryptographic hash function , key (lock) , message authentication code , authentication (law) , protocol (science) , computer network , hash based message authentication code , elliptic curve cryptography , pre shared key , cryptographic protocol , computer security , oakley protocol , cryptography , key exchange , public key cryptography , encryption , universal composability , medicine , alternative medicine , pathology

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here