Data Security Model Employing Hyperelliptic Curve Cryptography (HECC) and Secure Hash Algorithm-3 (Sha-3) in Cloud Computing
Data owners use the huge space offered by ‘Cloud’ Computing for storage of data and also for carrying out computations. To eliminate the burden of storing file locally, cloud stores them on remote servers using virtualization concepts. Therein arises one of the major issues in the field of cloud...
Main Authors: | Devi Thiyagarajan, Ganesan R. |
---|---|
Format: | Article |
Language: | English |
Published: |
Universitas Indonesia
2015-07-01
|
Series: | International Journal of Technology |
Subjects: | |
Online Access: | http://ijtech.eng.ui.ac.id/article/view/1394 |
Similar Items
-
Towards Efficient Hardware Implementation of Elliptic and Hyperelliptic Curve Cryptography
by: Ismail, Marwa Nabil
Published: (2012) -
Towards Efficient Hardware Implementation of Elliptic and Hyperelliptic Curve Cryptography
by: Ismail, Marwa Nabil
Published: (2012) -
A Computational Introduction to Elliptic and Hyperelliptic Curve Cryptography
by: Wilcox, Nicholas
Published: (2018) -
RFID Authentication Scheme Based on Hyperelliptic Curve Signcryption
by: Usman Ali, et al.
Published: (2021-01-01) -
Pencils of quadrics and Jacobians of hyperelliptic curves
by: Wang, Xiaoheng
Published: (2013)