ECC

(redirected from Elliptic curve cryptography)
Also found in: Thesaurus, Medical, Acronyms, Encyclopedia, Wikipedia.
ThesaurusAntonymsRelated WordsSynonymsLegend:
Noun1.ECC - (telecommunication) a coding system that incorporates extra parity bits in order to detect errors
telecommunication - (often plural) the branch of electrical engineering concerned with the technology of electronic communication at a distance
computer code, code - (computer science) the symbolic arrangement of data or instructions in a computer program or the set of such instructions
cyclic redundancy check - an error correction code that is recorded in each sector of a magnetic disk and used to catch errors in the data
Based on WordNet 3.0, Farlex clipart collection. © 2003-2012 Princeton University, Farlex Inc.
References in periodicals archive ?
On the other hand, many pairing free signcryption schemes based on elliptic curve cryptography (ECC) without the specific condition of ID based authentication can also be found in literature, see survey [16].
In this paper, we introduce a development to the adopted lightweight authentication and key management protocol by addressing the methods of Elliptic Curve Cryptography with Diffie-Helman.
The percentage of this traffic that is encrypted is surpassing 70% with the majority of that (over 80%) based on advanced elliptic curve cryptography (ECC) using Perfect Forward Secrecy (PFS).
The introduction of elliptic curve cryptography by Koblitz [3] and Miller [4] in the mid-1980s has yielded new public key algorithms based on the discrete logarithm problem.
Elliptic curve cryptography is used to detect and prevent these attacks.
The Elliptic Curve Cryptography (ECC) is nowadays already a frequently used method for lightweight secured communication solution and it is spread over wide areas.
Chou, "An efficient mutual authentication RFID scheme based on elliptic curve cryptography," Journal of Supercomputing, vol.
New York, NY, January 21, 2016 --(PR.com)-- Versasec, the leader in smart card management systems, today introduced the vSEC:CMS S-Series v4.3 product line featuring Elliptic Curve Cryptography (ECC), batch issuance using multiple parallel smart card readers and more functionality and support for Hardware Security Modules (HSM).
On the defensive side, NSA has recommended that implementors should transition to elliptic curve cryptography, which isn't known to suffer from this loophole, but such recommendations tend to go unheeded absent explicit justifications or demonstrations.
In this paper, we analyze the security of a novel 3PAKA protocol based on the elliptic curve cryptography and point out that it cannot withstand the key compromise impersonation attack.
For instance, Certicom has planned to enter the market by selling elliptic curve cryptography based software toolkits.