Curve Selection in Elliptic Curve Cryptography

نویسنده

  • Edward Yin
چکیده

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The new protocol blind digital signature based on the discrete logarithm problem on elliptic curve

In recent years it has been trying that with regard to the question of computational complexity of discrete logarithm more strength and less in the elliptic curve than other hard issues, applications such as elliptic curve cryptography, a blind  digital signature method, other methods such as encryption replacement DLP. In this paper, a new blind digital signature scheme based on elliptic curve...

متن کامل

Efficient elliptic curve cryptosystems

Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...

متن کامل

Fast Elliptic Curve Algorithm of Embedded Mobile Equipment

Selection Algorithm and Generation Algorithm of elliptic curves have been the focus of research and hotspot of the Elliptic Curve Cryptosystem. This paper discusses a random elliptic curve realization method of Embedded Mobile Equipment, the SEA algorithm and its improved algorithm from Elliptic Curve's selection, Elliptic Curve's structure and Elliptic Curve's generation. Ensuring that the emb...

متن کامل

A Practical Analysis of the Elliptic Curve Factoring Algorithm

Much asymptotic analysis has been devoted to factoring algorithms. We present a practical analysis of the complexity of the elliptic curve algorithm, suggesting optimal parameter selection and run-time guidelines. The parameter selection is aided by a novel use of Bayesian statistical decision techniques as applied to random algorithms. We discuss how frequently the elliptic curve algorithm suc...

متن کامل

On the Use of Optimum Curves in Elliptic Curve Cryptography for Wireless Sensor Networks

Providing security in Wireless Sensor Networks (WSNs) is a considerable challenge due to the concomitant limitations in processing time, power, area and energy consumption in sensor nodes and the nature of wireless links. A variety of cryptographic methods are available for security establishment. Among them, Elliptic Curve Cryptography (ECC) is the best candidate to accomplish this challenge b...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005