A New Approach to Elliptic Curve Cryptography

被引:0
|
作者
Singh, L. Dolendro [1 ]
Debbarma, Tribid [1 ]
机构
[1] Natl Inst Teclmol, Comp Sci & Engn, Agartala, India
关键词
Elliptic curve cryptography; baby step giant step; pollard rho; encryption; decryption;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
There are lots of cryptosystem which provides high security but they all come with a price that is large key size which requires high computing power device. Researchers have come up with an alternative for this that provides high security with smaller key size. This alternative is the Elliptic Curve Cryptosystem. This paper deals with the mathematics involve in the cryptosystem and an approach to work with smaller key size when the elliptic curve equation and the generator are kept secret between the users.
引用
收藏
页码:78 / 82
页数:5
相关论文
共 50 条
  • [32] A Critical Review on Elliptic Curve Cryptography
    Singh, Soram Ranbir
    Khan, Ajoy Kumar
    Singh, Takhellambam Sonamani
    [J]. 2016 INTERNATIONAL CONFERENCE ON AUTOMATIC CONTROL AND DYNAMIC OPTIMIZATION TECHNIQUES (ICACDOT), 2016, : 13 - 18
  • [33] Security Improvement in Elliptic Curve Cryptography
    Abdullah, Kawther Esaa
    Ali, Nada Hussein M.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (05) : 122 - 131
  • [34] A VHDL generator for elliptic curve cryptography
    Järvinen, K
    Tommiska, M
    Skyttä, J
    [J]. FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, 2004, 3203 : 1098 - 1100
  • [35] Elliptic Curve Cryptography for Ciphering Images
    Gupta, Nikita
    Kundu, Vikas
    Kurra, Neha
    Sharma, Shivani
    Pal, Bhagyashree
    [J]. 2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,
  • [36] Hardware Accelerators for Elliptic Curve Cryptography
    Puttmann, C.
    Shokrollahi, J.
    Porrmann, M.
    Rueckert, U.
    [J]. ADVANCES IN RADIO SCIENCE, 2008, 6 : 259 - 264
  • [37] Steganographic manipulations with elliptic curve cryptography
    Shankar, T. N.
    Sahoo, G.
    Niranjan, S.
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2012, 4 (04) : 280 - 297
  • [38] On Elliptic Curve Cryptography implementations and evaluation
    Alimi, Nejmeddine
    Lahbib, Younes
    Machhout, Mohsen
    Tourki, Rached
    [J]. 2016 2ND INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR SIGNAL AND IMAGE PROCESSING (ATSIP), 2016, : 35 - 40
  • [39] An Enhanced Elliptic Curve Cryptography for Biometric
    Althobaiti, Ohood S.
    Aboalsamh, Hatim A.
    [J]. 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTING AND CONVERGENCE TECHNOLOGY (ICCCT2012), 2012, : 1048 - 1055
  • [40] A new mobile secure electronic transaction protocol with elliptic curve cryptography
    Hu, XW
    Zhang, B
    Zhou, FC
    Yan, F
    Li, GJ
    [J]. Proceedings of the Third International Symposium on Magnetic Industry (ISMI'04) & First International Symposium on Physics and IT Industry (ISITI'04), 2005, : 318 - 320