{"title":"基于RSA和椭圆曲线密码的QR码认证性能比较","authors":"Non Thiranant, Young-Sil Lee, Hoon-Jae Lee","doi":"10.1109/WAINA.2015.62","DOIUrl":null,"url":null,"abstract":"In the QR Code authentication technique, smart phone has become a great tool and played an important role in the authentication process. It has been used in various fields over the internet, especially in multi-factor authentication. However, security aspects should be well taken care of. In this paper, the performance comparison between RSA and Elliptic Curve Cryptography-based QR Code Authentication is proposed. It mainly focuses on QR Code, as it is now widely used all over the world. In addition, existing and related work has leveraged the use of RSA, but no work done on Elliptic Curve Cryptography. The experiment results and comparisons are shown and described in this paper.","PeriodicalId":6845,"journal":{"name":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","volume":"70 1","pages":"278-282"},"PeriodicalIF":0.0000,"publicationDate":"2015-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"Performance Comparison Between RSA and Elliptic Curve Cryptography-Based QR Code Authentication\",\"authors\":\"Non Thiranant, Young-Sil Lee, Hoon-Jae Lee\",\"doi\":\"10.1109/WAINA.2015.62\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the QR Code authentication technique, smart phone has become a great tool and played an important role in the authentication process. It has been used in various fields over the internet, especially in multi-factor authentication. However, security aspects should be well taken care of. In this paper, the performance comparison between RSA and Elliptic Curve Cryptography-based QR Code Authentication is proposed. It mainly focuses on QR Code, as it is now widely used all over the world. In addition, existing and related work has leveraged the use of RSA, but no work done on Elliptic Curve Cryptography. The experiment results and comparisons are shown and described in this paper.\",\"PeriodicalId\":6845,\"journal\":{\"name\":\"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops\",\"volume\":\"70 1\",\"pages\":\"278-282\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-03-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WAINA.2015.62\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WAINA.2015.62","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Performance Comparison Between RSA and Elliptic Curve Cryptography-Based QR Code Authentication
In the QR Code authentication technique, smart phone has become a great tool and played an important role in the authentication process. It has been used in various fields over the internet, especially in multi-factor authentication. However, security aspects should be well taken care of. In this paper, the performance comparison between RSA and Elliptic Curve Cryptography-based QR Code Authentication is proposed. It mainly focuses on QR Code, as it is now widely used all over the world. In addition, existing and related work has leveraged the use of RSA, but no work done on Elliptic Curve Cryptography. The experiment results and comparisons are shown and described in this paper.