نتایج جستجو برای: elliptic curves cryptosystems

تعداد نتایج: 122712  

2014
Reza Azarderakhsh Dieter Fishbein David Jao

Presence of quantum computers is a real threat against the security of currently used public key cryptographic algorithms such as RSA and Elliptic curve cryptography. Isogeny computation on elliptic curves is believed to be difficult even on a quantum computer, and hence isogeny-based protocols represent one of the few truly practical approaches to constructing quantum-resistant cryptosystems. ...

Journal: :Journal of Systems and Software 2008
Guido Bertoni Luca Breveglieri Liqun Chen Pasqualina Fragneto Keith A. Harrison Gerardo Pelosi

The aim of this work is to show the feasibility of the primitives of the identity based cryptosystems for applications in Smart-Cards. Several observations are applied to easily choose many supersingular elliptic curves over a prime field Fp; p > 3; p 3 mod 4, in such a way that the size of the torsion subgroup, the curve order and the finite field characteristic are of minimal Hamming weight. ...

2002
Elisavet Konstantinou Yannis C. Stamatiou Christos D. Zaroliagis

We present a variant of the complex multiplication method that generates elliptic curves of cryptographically strong order. Our variant is based on the computation of Weber polynomials that require significantly less time and space resources than their Hilbert counterparts. We investigate the time efficiency and precision requirements for generating off-line Weber polynomials and its comparison...

Journal: :IACR Cryptology ePrint Archive 2011
Ming Li Ali Miri Daming Zhu

Scalar multiplication is an important operation in elliptic curve cryptosystems(ECC). The algorithms for computing scalar multiplication are mostly based on the binary expansions of scalars, such as the non-adjacent form (NAF) and wNAF(sliding window method). Representing scalars using more bases can speed up the scalar multiplication, such as mbNAF, wmbNAF and extended wmbNAF, which was propos...

2003
Mathieu Ciet Tanja Lange Francesco Sica Jean-Jacques Quisquater

In most algorithms involving elliptic curves, the most expensive part consists in computing multiples of points. This paper investigates how to extend the τ -adic expansion from Koblitz curves to a larger class of curves defined over a prime field having an efficiently-computable endomorphism φ in order to perform an efficient point multiplication with efficiency similar to Solinas’ approach pr...

2001
Jorge Guajardo Rainer Blümel Uwe Krieger Christof Paar

This contribution describes a methodology used to efficiently implement elliptic curves (EC) over GF (p) on the 16-bit TI MSP430x33x family of low-cost microcontrollers. We show that it is possible to implement EC cryptosystems in highly constrained embedded systems and still obtain acceptable performance at low cost. We modified the EC point addition and doubling formulae to reduce the number ...

Journal: :IACR Cryptology ePrint Archive 2003
Huafei Zhu

We study elliptic curve cryptosystems by first investigating the schemes defined over Zp and show that the scheme is provably secure against adaptive chosen cipher-text attack under the decisional DiffieHellman assumption. Then we derive a practical elliptic curve cryptosystem by making use of some nice elliptic curve where the decisional DiffieHellman assumption is reserved.

Journal: :Ukrainian Scientific Journal of Information Security 2012

2017
Tim Ribaric

Public-key cryptography is a fundamental component of modern electronic communication that can be constructed with many different mathematical processes. Presently, cryptosystems based on elliptic curves are becoming popular due to strong cryptographic strength per small key size. At the heart of these schemes is the complexity of the elliptic curve discrete logarithm problem (ECDLP). Pollard’s...

Journal: :Connection science 2021

Since sensor nodes in wireless networks or Internet of things have limited resources, achieving secure data transmissions among is a challenge. Hence, efficient key management schemes with lightweight ciphers are essential. Many asymmetric keys public mechanisms been developed. However, they unsuitable for group communications networks, because usually devoid sufficient memory, CPU and bandwidt...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید