Comparative Analysis of various Cryptographic Algorithms with ECC Article Swipe
In today's generation, internet has been the main source of data communication. In a pervasive computing environment, ECC has been preferred because of its suitability to the devices and having limited battery power, bandwidth, less memory and less computational resources. This paper provides various cryptographic algorithms, its encryption, decryption and general computational approach. Security being the major issues in today's life so the data protection over the communication is very important.
Related Topics
Concepts
Metadata
- Type
- article
- Language
- en
- Landing Page
- http://doi.org/10.22214/ijraset.2018.4503
- https://doi.org/10.22214/ijraset.2018.4503
- OA Status
- bronze
- References
- 3
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W2804988252
All OpenAlex metadata
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W2804988252Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.22214/ijraset.2018.4503Digital Object Identifier
- Title
-
Comparative Analysis of various Cryptographic Algorithms with ECCWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2018Year of publication
- Publication date
-
2018-04-30Full publication date if available
- Authors
-
Aman VermaList of authors in order
- Landing page
-
https://doi.org/10.22214/ijraset.2018.4503Publisher landing page
- PDF URL
-
https://doi.org/10.22214/ijraset.2018.4503Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
bronzeOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.22214/ijraset.2018.4503Direct OA link when available
- Concepts
-
Computer science, Cryptography, AlgorithmTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
3Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W2804988252 |
|---|---|
| doi | https://doi.org/10.22214/ijraset.2018.4503 |
| ids.doi | https://doi.org/10.22214/ijraset.2018.4503 |
| ids.mag | 2804988252 |
| ids.openalex | https://openalex.org/W2804988252 |
| fwci | 0.0 |
| type | article |
| title | Comparative Analysis of various Cryptographic Algorithms with ECC |
| biblio.issue | 4 |
| biblio.volume | 6 |
| biblio.last_page | 3022 |
| biblio.first_page | 3018 |
| topics[0].id | https://openalex.org/T11693 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9747999906539917 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1710 |
| topics[0].subfield.display_name | Information Systems |
| topics[0].display_name | Cryptography and Residue Arithmetic |
| topics[1].id | https://openalex.org/T10951 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9645000100135803 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Cryptographic Implementations and Security |
| topics[2].id | https://openalex.org/T11130 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9605000019073486 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1702 |
| topics[2].subfield.display_name | Artificial Intelligence |
| topics[2].display_name | Coding theory and cryptography |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.6762341260910034 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C178489894 |
| concepts[1].level | 2 |
| concepts[1].score | 0.5702698826789856 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q8789 |
| concepts[1].display_name | Cryptography |
| concepts[2].id | https://openalex.org/C11413529 |
| concepts[2].level | 1 |
| concepts[2].score | 0.34495270252227783 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q8366 |
| concepts[2].display_name | Algorithm |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.6762341260910034 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/cryptography |
| keywords[1].score | 0.5702698826789856 |
| keywords[1].display_name | Cryptography |
| keywords[2].id | https://openalex.org/keywords/algorithm |
| keywords[2].score | 0.34495270252227783 |
| keywords[2].display_name | Algorithm |
| language | en |
| locations[0].id | doi:10.22214/ijraset.2018.4503 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S2764566388 |
| locations[0].source.issn | 2321-9653 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 2321-9653 |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | International Journal for Research in Applied Science and Engineering Technology |
| locations[0].source.host_organization | https://openalex.org/P4322614460 |
| locations[0].source.host_organization_name | International Journal for Research in Applied Science and Engineering Technology (IJRASET) |
| locations[0].source.host_organization_lineage | https://openalex.org/P4322614460 |
| locations[0].source.host_organization_lineage_names | International Journal for Research in Applied Science and Engineering Technology (IJRASET) |
| locations[0].license | |
| locations[0].pdf_url | https://doi.org/10.22214/ijraset.2018.4503 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | International Journal for Research in Applied Science and Engineering Technology |
| locations[0].landing_page_url | http://doi.org/10.22214/ijraset.2018.4503 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5049629789 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-7436-1325 |
| authorships[0].author.display_name | Aman Verma |
| authorships[0].affiliations[0].raw_affiliation_string | M.Tech Student, BBAU, Vidya Vihar Raibareily Road Lucknow |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Aman Verma |
| authorships[0].is_corresponding | True |
| authorships[0].raw_affiliation_strings | M.Tech Student, BBAU, Vidya Vihar Raibareily Road Lucknow |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.22214/ijraset.2018.4503 |
| open_access.oa_status | bronze |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Comparative Analysis of various Cryptographic Algorithms with ECC |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11693 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9747999906539917 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1710 |
| primary_topic.subfield.display_name | Information Systems |
| primary_topic.display_name | Cryptography and Residue Arithmetic |
| related_works | https://openalex.org/W2899084033, https://openalex.org/W2748952813, https://openalex.org/W2051487156, https://openalex.org/W2073681303, https://openalex.org/W2390279801, https://openalex.org/W2358668433, https://openalex.org/W2317200988, https://openalex.org/W2376932109, https://openalex.org/W2382290278, https://openalex.org/W2350741829 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.22214/ijraset.2018.4503 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S2764566388 |
| best_oa_location.source.issn | 2321-9653 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 2321-9653 |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | International Journal for Research in Applied Science and Engineering Technology |
| best_oa_location.source.host_organization | https://openalex.org/P4322614460 |
| best_oa_location.source.host_organization_name | International Journal for Research in Applied Science and Engineering Technology (IJRASET) |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4322614460 |
| best_oa_location.source.host_organization_lineage_names | International Journal for Research in Applied Science and Engineering Technology (IJRASET) |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://doi.org/10.22214/ijraset.2018.4503 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | International Journal for Research in Applied Science and Engineering Technology |
| best_oa_location.landing_page_url | http://doi.org/10.22214/ijraset.2018.4503 |
| primary_location.id | doi:10.22214/ijraset.2018.4503 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S2764566388 |
| primary_location.source.issn | 2321-9653 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 2321-9653 |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | International Journal for Research in Applied Science and Engineering Technology |
| primary_location.source.host_organization | https://openalex.org/P4322614460 |
| primary_location.source.host_organization_name | International Journal for Research in Applied Science and Engineering Technology (IJRASET) |
| primary_location.source.host_organization_lineage | https://openalex.org/P4322614460 |
| primary_location.source.host_organization_lineage_names | International Journal for Research in Applied Science and Engineering Technology (IJRASET) |
| primary_location.license | |
| primary_location.pdf_url | https://doi.org/10.22214/ijraset.2018.4503 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | International Journal for Research in Applied Science and Engineering Technology |
| primary_location.landing_page_url | http://doi.org/10.22214/ijraset.2018.4503 |
| publication_date | 2018-04-30 |
| publication_year | 2018 |
| referenced_works | https://openalex.org/W2185385784, https://openalex.org/W2468205606, https://openalex.org/W1581622364 |
| referenced_works_count | 3 |
| abstract_inverted_index.a | 13 |
| abstract_inverted_index.In | 0, 12 |
| abstract_inverted_index.in | 58 |
| abstract_inverted_index.is | 68 |
| abstract_inverted_index.of | 9, 22 |
| abstract_inverted_index.so | 61 |
| abstract_inverted_index.to | 25 |
| abstract_inverted_index.ECC | 17 |
| abstract_inverted_index.and | 28, 36, 49 |
| abstract_inverted_index.has | 4, 18 |
| abstract_inverted_index.its | 23, 46 |
| abstract_inverted_index.the | 6, 26, 55, 62, 66 |
| abstract_inverted_index.This | 40 |
| abstract_inverted_index.been | 5, 19 |
| abstract_inverted_index.data | 10, 63 |
| abstract_inverted_index.less | 34, 37 |
| abstract_inverted_index.life | 60 |
| abstract_inverted_index.main | 7 |
| abstract_inverted_index.over | 65 |
| abstract_inverted_index.very | 69 |
| abstract_inverted_index.being | 54 |
| abstract_inverted_index.major | 56 |
| abstract_inverted_index.paper | 41 |
| abstract_inverted_index.having | 29 |
| abstract_inverted_index.issues | 57 |
| abstract_inverted_index.memory | 35 |
| abstract_inverted_index.power, | 32 |
| abstract_inverted_index.source | 8 |
| abstract_inverted_index.battery | 31 |
| abstract_inverted_index.because | 21 |
| abstract_inverted_index.devices | 27 |
| abstract_inverted_index.general | 50 |
| abstract_inverted_index.limited | 30 |
| abstract_inverted_index.today's | 1, 59 |
| abstract_inverted_index.various | 43 |
| abstract_inverted_index.Security | 53 |
| abstract_inverted_index.internet | 3 |
| abstract_inverted_index.provides | 42 |
| abstract_inverted_index.approach. | 52 |
| abstract_inverted_index.computing | 15 |
| abstract_inverted_index.pervasive | 14 |
| abstract_inverted_index.preferred | 20 |
| abstract_inverted_index.bandwidth, | 33 |
| abstract_inverted_index.decryption | 48 |
| abstract_inverted_index.important. | 70 |
| abstract_inverted_index.protection | 64 |
| abstract_inverted_index.resources. | 39 |
| abstract_inverted_index.algorithms, | 45 |
| abstract_inverted_index.encryption, | 47 |
| abstract_inverted_index.generation, | 2 |
| abstract_inverted_index.suitability | 24 |
| abstract_inverted_index.environment, | 16 |
| abstract_inverted_index.communication | 67 |
| abstract_inverted_index.computational | 38, 51 |
| abstract_inverted_index.cryptographic | 44 |
| abstract_inverted_index.communication. | 11 |
| cited_by_percentile_year | |
| corresponding_author_ids | https://openalex.org/A5049629789 |
| countries_distinct_count | 0 |
| institutions_distinct_count | 1 |
| citation_normalized_percentile.value | 0.05779846 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |