A Study of Elliptic Curve Cryptography and Its Applications

被引:1
|
作者
Nikhil, U. Vijay [1 ]
Stamenkovic, Z. [2 ,3 ]
Raja, S. P. [1 ]
机构
[1] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
[2] Univ Potsdam, Inst Computat Sci, Bahn 2, D-14467 Potsdam, Germany
[3] IHP Leibniz Inst Innovat Mikroelekt, Technol Pk 25, D-15236 Frankfurt, Germany
关键词
Elliptic curve cryptography; ARCHITECTURE; ECC;
D O I
10.1142/S0219467825500627
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper aims to provide a comprehensive review on Elliptic Curve Cryptography (ECC), a public key cryptographic system and its applications. The paper discusses important mathematical properties and operations of elliptic curves, like point addition and multiplication operations and its implementation in cryptographic methods such as encryption and decryption. This paper provides a detailed workout on important mathematical problems on elliptic curves and ECC which provides insight into working of essential cryptographic techniques in ECC. And the paper also provides a literature review of research works based on ECC in various fields such as Internet of Things (IoT), Cloud computing, Blockchain and Image Security. And the paper further provides insight into the recent applications of ECC in fields like IoT and Blockchain by comprehensively discussing the proposed mechanism for each of the recent applications and also briefly discussing the security of the proposed mechanism.
引用
收藏
页数:48
相关论文
共 50 条
  • [1] Research Issues on Elliptic Curve Cryptography and Its applications
    Shanmugalakshmi, R.
    Prabu, M.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (06): : 19 - 22
  • [2] The elliptic scalar multiplication graph and its application in elliptic curve cryptography
    Aljamaly, Karrar Taher R.
    Ajeena, Ruma Kareem K.
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (06): : 1793 - 1807
  • [3] Lightweight elliptic curve cryptography accelerator for internet of things applications
    Andres Lara-Nino, Carlos
    Diaz-Perez, Arturo
    Morales-Sandoval, Miguel
    [J]. AD HOC NETWORKS, 2020, 103
  • [4] Architectures for unified field inversion with applications in elliptic curve cryptography
    Savas, E
    Koç, EK
    [J]. ICES 2002: 9TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS, VOLS I-111, CONFERENCE PROCEEDINGS, 2002, : 1155 - 1158
  • [5] A result on the distribution of quadratic residues with applications to elliptic curve cryptography
    Muralidhara, V. N.
    Sen, Sandeep
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 48 - +
  • [6] Elliptic Curve Cryptography on FPGA for Low-Power Applications
    Keller, Maurice
    Byrne, Andrew
    Marnane, William P.
    [J]. ACM TRANSACTIONS ON RECONFIGURABLE TECHNOLOGY AND SYSTEMS, 2009, 2 (01)
  • [7] Elliptic Curve Cryptography on PocketPCs
    Edoh, Kossi
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2009, 3 (03): : 23 - 33
  • [8] The state of elliptic curve cryptography
    Koblitz, N
    Menezes, A
    Vanstone, S
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2000, 19 (2-3) : 173 - 193
  • [9] Elliptic Curve Cryptography in Practice
    Bos, Joppe W.
    Halderman, J. Alex
    Heninger, Nadia
    Moore, Jonathan
    Naehrig, Michael
    Wustrow, Eric
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 157 - 175
  • [10] Elliptic-curve cryptography
    Fernandes, AD
    [J]. DR DOBBS JOURNAL, 1999, 24 (12): : 56 - +