Research on elliptic curve cryptography

被引:0
|
作者
Qiu, QZ [1 ]
Xiong, QX [1 ]
机构
[1] Wuhan Univ Technol, Wuhan 430070, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
There are many drawbacks in current encryption algorithms in respect of security, real-time performance and so on, and researchers are presenting various algorithms. Among them, the Elliptic Curve Cryptography (ECC) is evolving as an important cryptography, and shows a promise to be an alternative of RSA. Small size, high security and other features characterize ECC. Based on the theory of ECC this paper analyzes its advantages over other cryptographies and focuses on its principle. A practical application implemented by Java is also presented. At last, some future works in ECC are indicated.
引用
收藏
页码:698 / 701
页数:4
相关论文
共 50 条
  • [1] Research and Optimizing of the Algorithm of Elliptic Curve Cryptography
    Chen, Er-Yang
    Lei, Lin
    Luo, Jun-Yi
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 1219 - 1225
  • [2] Research on the Underlying Method of Elliptic Curve Cryptography
    Fang, Xianjin
    Yang, Gaoming
    Wu, Yanting
    [J]. 2017 4TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE), 2017, : 639 - 643
  • [3] Research on design of elliptic curve cryptography chip
    Wang Zhaoshun
    Shen Guicheng
    Zhang Ranlin
    [J]. Proceedings of 2006 International Conference on Artificial Intelligence: 50 YEARS' ACHIEVEMENTS, FUTURE DIRECTIONS AND SOCIAL IMPACTS, 2006, : 600 - 603
  • [4] Research Issues on Elliptic Curve Cryptography and Its applications
    Shanmugalakshmi, R.
    Prabu, M.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (06): : 19 - 22
  • [5] Elliptic Curve Cryptography: Current Status and Research Challenges
    Kalra, Sheetal
    Sood, Sandeep K.
    [J]. HIGH PERFORMANCE ARCHITECTURE AND GRID COMPUTING, 2011, 169 : 455 - +
  • [6] The state of elliptic curve cryptography
    Koblitz, N
    Menezes, A
    Vanstone, S
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2000, 19 (2-3) : 173 - 193
  • [7] Elliptic Curve Cryptography on PocketPCs
    Edoh, Kossi
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2009, 3 (03): : 23 - 33
  • [8] A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY
    Aydin, M. Ali
    Aydin, G. Zeynep
    [J]. ISTANBUL UNIVERSITY-JOURNAL OF ELECTRICAL AND ELECTRONICS ENGINEERING, 2006, 6 (02): : 211 - 221
  • [9] Elliptic Curve Cryptography in Practice
    Bos, Joppe W.
    Halderman, J. Alex
    Heninger, Nadia
    Moore, Jonathan
    Naehrig, Michael
    Wustrow, Eric
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 157 - 175
  • [10] Elliptic-curve cryptography
    Fernandes, AD
    [J]. DR DOBBS JOURNAL, 1999, 24 (12): : 56 - +