Elliptic curve cryptography on constraint environments

被引:0
|
作者
de Santos, MD [1 ]
Sanchez-Avila, C [1 ]
Sanchez-Reillo, R [1 ]
机构
[1] Univ Politecn Madrid, ETSI Telecommun, Dpto Matemat Aplicada, E-28040 Madrid, Spain
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The main target of this work is to expose the capacities that make elliptic curve cryptography the most suitable one to be implemented in environments with several constraints related to processor speed, bandwidth, security and memory. We have analyzed several elliptic curve cryptosystems with other public key ones. We have made a comparison among different public key cryptosystems (such as ElGamal for encryption and Diffie-Hellman for key exchanging) and the corresponding ones based on elliptic curve theory; highlighting algorithm speed characteristics.
引用
收藏
页码:212 / 220
页数:9
相关论文
共 50 条
  • [21] Analysis of Elliptic Curve Cryptography & RSA
    Khan M.R.
    Upreti K.
    Alam M.I.
    Khan H.
    Siddiqui S.T.
    Haque M.
    Parashar J.
    Journal of ICT Standardization, 2023, 11 (04): : 355 - 378
  • [22] Elliptic Curve Cryptography: A Dynamic Paradigm
    Som, Subhranil
    Majumder, Rana
    Dutta, Sandip
    2017 INTERNATIONAL CONFERENCE ON INFOCOM TECHNOLOGIES AND UNMANNED SYSTEMS (TRENDS AND FUTURE DIRECTIONS) (ICTUS), 2017, : 427 - 431
  • [23] Compiler assisted elliptic curve cryptography
    Barbosa, M.
    Moss, A.
    Page, D.
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2007: COOPIS, DOA, ODBASE, GADA, AND IS, PT 2, PROCEEDINGS, 2007, 4804 : 1785 - +
  • [24] A software library for elliptic curve cryptography
    Konstantinou, E
    Stamatiou, Y
    Zaroliagis, C
    ALGORITHMS-ESA 2002, PROCEEDINGS, 2002, 2461 : 625 - 636
  • [25] A reconfiguration hierarchy for elliptic curve cryptography
    Schaumont, P
    Verbauwhede, I
    CONFERENCE RECORD OF THE THIRTY-FIFTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, VOLS 1 AND 2, 2001, : 449 - 453
  • [26] Optimal Implementation of Elliptic Curve Cryptography
    Lv, Hongqiang
    Li, Hui
    Yi, Junkai
    Lu, Hao
    2013 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS (SOLI), 2013, : 35 - 39
  • [27] Elliptic curve cryptography on smart cards
    de-Miguel-de-Santos, M
    Sanchez-Avila, C
    Sanchez-Reillo, R
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL V, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2004, : 162 - 167
  • [28] Low power elliptic curve cryptography
    Keller, Maurice
    Marnane, William
    INTEGRATED CIRCUIT AND SYSTEM DESIGN: POWER AND TIMING MODELING, OPTIMIZATION AND SIMULATION, 2007, 4644 : 310 - +
  • [30] Security Improvement in Elliptic Curve Cryptography
    Abdullah, Kawther Esaa
    Ali, Nada Hussein M.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (05) : 122 - 131