Reference Hub3
Secure and Robust Telemedicine using ECC on Radix-8 with Formal Verification

Secure and Robust Telemedicine using ECC on Radix-8 with Formal Verification

Gautam Kumar, Hemraj Saini
Copyright: © 2018 |Volume: 12 |Issue: 1 |Pages: 16
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781522543060|DOI: 10.4018/IJISP.2018010102
Cite Article Cite Article

MLA

Kumar, Gautam, and Hemraj Saini. "Secure and Robust Telemedicine using ECC on Radix-8 with Formal Verification." IJISP vol.12, no.1 2018: pp.13-28. http://doi.org/10.4018/IJISP.2018010102

APA

Kumar, G. & Saini, H. (2018). Secure and Robust Telemedicine using ECC on Radix-8 with Formal Verification. International Journal of Information Security and Privacy (IJISP), 12(1), 13-28. http://doi.org/10.4018/IJISP.2018010102

Chicago

Kumar, Gautam, and Hemraj Saini. "Secure and Robust Telemedicine using ECC on Radix-8 with Formal Verification," International Journal of Information Security and Privacy (IJISP) 12, no.1: 13-28. http://doi.org/10.4018/IJISP.2018010102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The scalar multiplication techniques used in Elliptic curve cryptography (ECC) are having the scope for gaining the computation efficiency. This is possible through the reduction of precomputed operations. Finding the more efficient technique compares to the most recent or efficient one is a research gap for all schemes. The manuscript presents an application oriented work for Telemedicine using ECC. It is based on robust application on reduced computational complexity. The methodology we apply for the same is Scalar Multiplication without precomputation on Radix-8. Introduced software and the hardware performance are reporting a big advantage over all the related proposed techniques. The reason to cover this problem is to provide a path on a fascinating area of ECC on a smaller key size be applicable for all applications on a same level of security strengths. The smaller length key gives the higher speed and shorter clock cycle to initiate the operation.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.