Assessing the effectiveness of artificial neural networks on problems related to elliptic curve cryptography

نویسندگان

  • Elena C. Laskari
  • Gerasimos C. Meletiou
  • Yannis C. Stamatiou
  • Dimitris K. Tasoulis
  • Michael N. Vrahatis
چکیده

Cryptographic systems based on elliptic curves have been introduced as an alternative to conventional public key cryptosystems. The security of both kinds of cryptosystems relies on the hypothesis that the underlying mathematical problems are computationally intractable, in the sense that they cannot be solved in polynomial time. In this paper, we study the performance of artificial neural networks on the computation of a Boolean function derived from the use of elliptic curves in cryptographic applications. c © 2007 Elsevier Ltd. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The new protocol blind digital signature based on the discrete logarithm problem on elliptic curve

In recent years it has been trying that with regard to the question of computational complexity of discrete logarithm more strength and less in the elliptic curve than other hard issues, applications such as elliptic curve cryptography, a blind  digital signature method, other methods such as encryption replacement DLP. In this paper, a new blind digital signature scheme based on elliptic curve...

متن کامل

Efficient elliptic curve cryptosystems

Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...

متن کامل

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

Optimizing Multiple Response Problem Using Artificial Neural Networks and Genetic Algorithm

  This paper proposes a new intelligent approach for solving multi-response statistical optimization problems. In most real world optimization problems, we are encountered adjusting process variables to achieve optimal levels of output variables (response variables). Usual optimization methods often begin with estimating the relation function between the response variable and the control variab...

متن کامل

Use of Artificial Neural Networks and PCA to Predict Results of Infertility Treatment in the ICSI Method

Background: Intracytoplasmic sperm injection (ICSI) or microinjection is one of the most commonly used assisted reproductive technologies (ART) in the treatment of patients with infertility problems. At each stage of this treatment cycle, many dependent and independent variables may affect the results, according to which, estimating the accuracy of fertility rate for physicians will be difficul...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Mathematical and Computer Modelling

دوره 46  شماره 

صفحات  -

تاریخ انتشار 2007