Research on elliptic curve cryptography

被引:0
|
作者
Qiu, QZ [1 ]
Xiong, QX [1 ]
机构
[1] Wuhan Univ Technol, Wuhan 430070, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
There are many drawbacks in current encryption algorithms in respect of security, real-time performance and so on, and researchers are presenting various algorithms. Among them, the Elliptic Curve Cryptography (ECC) is evolving as an important cryptography, and shows a promise to be an alternative of RSA. Small size, high security and other features characterize ECC. Based on the theory of ECC this paper analyzes its advantages over other cryptographies and focuses on its principle. A practical application implemented by Java is also presented. At last, some future works in ECC are indicated.
引用
收藏
页码:698 / 701
页数:4
相关论文
共 50 条
  • [41] Steganographic manipulations with elliptic curve cryptography
    Shankar, T. N.
    Sahoo, G.
    Niranjan, S.
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2012, 4 (04) : 280 - 297
  • [42] Elliptic Curve Cryptography for Ciphering Images
    Gupta, Nikita
    Kundu, Vikas
    Kurra, Neha
    Sharma, Shivani
    Pal, Bhagyashree
    [J]. 2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,
  • [43] Research on Fusion Algorithm of Elliptic Curve Cryptography in Advanced Metering Infrastructure Communication
    Zhang, Xidong
    Tong, Weiming
    Jin, Xianji
    Dai, Shuidong
    [J]. 2014 SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2014), VOL 1, 2014, : 395 - 398
  • [44] Research on the Millionaires' Problem under the Malicious Model Based on the Elliptic Curve Cryptography
    Liu, Xin
    Xu, Yang
    Xu, Gang
    Li, Baoshan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [45] Authentication protocol based on elliptic curve cryptography
    Constantinescu, Nicolae
    [J]. ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2010, 37 (02): : 83 - 91
  • [46] JPEG Image Encryption with Elliptic Curve Cryptography
    Bakhtiari, Saeid
    Ibrahim, Subariah
    Salleh, Mazleena
    Bakhtiari, Majid
    [J]. 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 144 - 149
  • [47] Generalized Fibonacci Sequences for Elliptic Curve Cryptography
    Cheddour, Zakariae
    Chillali, Abdelhakim
    Mouhib, Ali
    [J]. MATHEMATICS, 2023, 11 (22)
  • [48] Customising hardware designs for elliptic curve cryptography
    Telle, N
    Luk, W
    Cheung, RCC
    [J]. COMPUTER SYSTEMS: ARCHITECTURES, MODELING, AND SIMULATION, 2004, 3133 : 274 - 283
  • [49] Implementation of Elliptic Curve Cryptography in Binary Field
    Susantio, D. R.
    Muchtadi-Alamsyah, I.
    [J]. 4TH INTERNATIONAL CONFERENCE ON SCIENCE & ENGINEERING IN MATHEMATICS, CHEMISTRY AND PHYSICS 2016 (SCIETECH 2016), 2016, 710
  • [50] Design of an Efficient Elliptic Curve Cryptography Coprocessor
    MuthuKumar, B.
    Jeevananthan, Dr. S.
    [J]. FIRST INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING 2009 (ICAC 2009), 2009, : 34 - +