{"title":"密码学和椭圆曲线密码学的最新发展概况","authors":"S. Pingle","doi":"10.18535/IJSRE/V4I05.03","DOIUrl":null,"url":null,"abstract":"With the advances in electronic technology today there is a lot of progress in computing power and also the parallelism in processors . These advances have made cryptographic solutions to security more complicated specially in the case of electronic transactions. There are many cryptographic techniques which have their own advantages and characteristics. There are basically two types of cryptosystems .symmetric and asymmetric. Some of them make use of small key. This paper gives survey of all such systems and also the comparative study of them with elliptic curve cryptography.","PeriodicalId":14282,"journal":{"name":"International Journal of Scientific Research in Education","volume":"47 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2016-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A Survey of Latest Trends in Cryptography and Elliptic Curve Cryptography\",\"authors\":\"S. Pingle\",\"doi\":\"10.18535/IJSRE/V4I05.03\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the advances in electronic technology today there is a lot of progress in computing power and also the parallelism in processors . These advances have made cryptographic solutions to security more complicated specially in the case of electronic transactions. There are many cryptographic techniques which have their own advantages and characteristics. There are basically two types of cryptosystems .symmetric and asymmetric. Some of them make use of small key. This paper gives survey of all such systems and also the comparative study of them with elliptic curve cryptography.\",\"PeriodicalId\":14282,\"journal\":{\"name\":\"International Journal of Scientific Research in Education\",\"volume\":\"47 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-05-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Scientific Research in Education\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.18535/IJSRE/V4I05.03\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Scientific Research in Education","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.18535/IJSRE/V4I05.03","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Survey of Latest Trends in Cryptography and Elliptic Curve Cryptography
With the advances in electronic technology today there is a lot of progress in computing power and also the parallelism in processors . These advances have made cryptographic solutions to security more complicated specially in the case of electronic transactions. There are many cryptographic techniques which have their own advantages and characteristics. There are basically two types of cryptosystems .symmetric and asymmetric. Some of them make use of small key. This paper gives survey of all such systems and also the comparative study of them with elliptic curve cryptography.