On Assurance of Information Security using Elliptic Curves Cryptosystems

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Information Security on Elliptic Curves

The aim of this paper is to provide an overview for the research that has been done so far on elliptic curves cryptography role in information security area. The elliptic curves cryptosystem is the newest public-key cryptographic system and represents a mathematically richer procedure then the traditional cryptosystem based on public-key, like RSA, Diffie-Hellman, ElGamal and Digital Signature ...

متن کامل

Efficient elliptic curve cryptosystems

Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...

متن کامل

Analysis of ECIES and Other Cryptosystems Based on Elliptic Curves

Elliptic Curve Cryptography (ECC) can be used as a tool for encrypting data, creating digital signatures or performing key exchanges. Regarding the encryption procedure, the schemes currently used are known as hybrid cryptosystems, as they use both symmetric and asymmetric techniques. Among those hybrid cryptosystems based on ECC, the Elliptic Curve Integrated Encryption Scheme (ECIES) is the b...

متن کامل

Information Assurance and Security

Information assurance contains all the elements of information security (confidentiality) but also includes elements of availability, and integrity. Information assurance provides a view of information protection that includes defensive measures in all three states — processing, storage, and transmission. To defend information and data there are three fundamental countermeasure categories: 1. t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Internet Technology and Secured Transaction

سال: 2012

ISSN: 2046-3723

DOI: 10.20533/jitst.2046.3723.2012.0003