{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:44:25Z","timestamp":1742913865468,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":16,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811666155"},{"type":"electronic","value":"9789811666162"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-6616-2_51","type":"book-chapter","created":{"date-parts":[[2022,4,23]],"date-time":"2022-04-23T12:03:01Z","timestamp":1650715381000},"page":"521-529","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Secure and Efficient Text Encryption Using Elliptic Curve Cryptography"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7418-1997","authenticated-orcid":false,"given":"Ningthoukhongjam Tutu","family":"Raja","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6698-1185","authenticated-orcid":false,"given":"Khumanthem Manglem","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,24]]},"reference":[{"key":"51_CR1","doi-asserted-by":"crossref","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203\u2013209 (1987)","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"51_CR2","unstructured":"Miller, V.: Use of elliptic curve in cryptograhy. Adva. Cryptogr. CRYPTO\u201985, LNCS 218, 417\u2013126 (1986)"},{"key":"51_CR3","unstructured":"ANSI X9.63: Public Key Cryptography for the Financial Services Industry: Key Agree- ment and Key Transport Using Elliptic Curve Cryptography. American National Standards Institute (2001)"},{"key":"51_CR4","unstructured":"IEEE 1363\u20132000: Standard Specifications for Public Key Cryptography (2000)"},{"key":"51_CR5","unstructured":"ISO\/IEC 15946-3: Information Technology\u2013Security Techniques\u2014Cryptographic Tech- niquesBased on Elliptic Curves\u2014Part 3: Key Establishment. (2002)"},{"key":"51_CR6","unstructured":"NIST: Digital Signature standard. FIPS publication, 186-2(2000)"},{"key":"51_CR7","unstructured":"Peter, L.: Montgomery: speeding the pollard and elliptic curve methods of factorization. American Mathematical Society (1987). http:\/\/www.jstor.org\/stable\/pdfplus\/2007888.pdf"},{"key":"51_CR8","unstructured":"N. P. Smart: The Hessian form of an elliptic curve. Springer-Verlag Berlin Heidelberg, ISBN 978-3-540-42521-2 (2001)"},{"key":"51_CR9","unstructured":"Billet, O., Joye, M.: The Jacobi model of an Elliptic Curve and the Side-channel Analysis. Springer-Verlag Berlin Heidelberg. ISBN 978-3-540-40111-7 (2003)"},{"key":"51_CR10","doi-asserted-by":"crossref","unstructured":"Singh, L.D., Singh, K.M.: Implementation of text encryption using elliptic curve cryptography. Procedia Comput. Sci. 54(1), 73\u201382 (2015)","DOI":"10.1016\/j.procs.2015.06.009"},{"key":"51_CR11","doi-asserted-by":"crossref","unstructured":"Keerthi, K., Surendiran, B.: Elliptic curve cryptography for secured text encryption. In: International Conference on Circuit, Power and Computing Technologies (ICCPCT), pp. 1\u20135 (2017)","DOI":"10.1109\/ICCPCT.2017.8074210"},{"key":"51_CR12","doi-asserted-by":"crossref","unstructured":"Singh, B.K., Tsegaye, A., Singh, J.: Probabilistic data encryption using elliptic curve cryptography and Arnold transformation. In: International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), pp. 644\u2013651(2017)","DOI":"10.1109\/I-SMAC.2017.8058259"},{"key":"51_CR13","doi-asserted-by":"crossref","unstructured":"Som, S.: Encryption technique using elliptic curve cryptography through compression and artificial intelligence. In: Bokhari, M., Agrawal, N., Saini, D. (eds) Cyber Security. Advances in Intelligent Systems and Computing, vol. 729. Springer, Singapore, (2018)","DOI":"10.1007\/978-981-10-8536-9_42"},{"key":"51_CR14","doi-asserted-by":"crossref","unstructured":"Das, P., Giri, C.: An efficient method for text encryption using elliptic curve cryptography. In: 8th International Advance Computing Conference (IACC), pp. 96\u2013101 (2018)","DOI":"10.1109\/IADCC.2018.8692087"},{"key":"51_CR15","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/s40031-018-0324-x","volume":"99","author":"S Kota","year":"2018","unstructured":"Kota, S., Padmanabhuni, V.N., Budda, K., et al.: Authentication and encryption using modified elliptic curve cryptography with particle swarm optimization and cuckoo search algorithm. J. Inst. Eng. India Ser. B 99, 343\u2013351 (2018)","journal-title":"J. Inst. Eng. India Ser. B"},{"key":"51_CR16","doi-asserted-by":"crossref","unstructured":"Almajed, H. N., Almogren, A.S.: SE-Enc: A secure and efficient encoding scheme using elliptic curve cryptography. IEEE Access 7, 175865\u2013175878 (2019)","DOI":"10.1109\/ACCESS.2019.2957943"}],"container-title":["Smart Innovation, Systems and Technologies","Evolution in Computational Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-6616-2_51","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,23]],"date-time":"2022-04-23T12:14:25Z","timestamp":1650716065000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-6616-2_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811666155","9789811666162"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-6616-2_51","relation":{},"ISSN":["2190-3018","2190-3026"],"issn-type":[{"type":"print","value":"2190-3018"},{"type":"electronic","value":"2190-3026"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"24 April 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}