A Critical Review on Elliptic Curve Cryptography

被引:0
|
作者
Singh, Soram Ranbir [1 ]
Khan, Ajoy Kumar [2 ]
Singh, Takhellambam Sonamani [1 ]
机构
[1] Manipur Inst Technol, Imphal, Manipur, India
[2] Assam Univ, Silchar, India
关键词
Elliptic Curve; Cryptography; ECDLP; Encryption; Decryption;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Elliptic curves in the geometric and algebraic parlances have been studied by computer scientists over the last few decades. Elliptic Curve Cryptography or Cryptosystem (ECC) is a public-key cryptosystem. The main advantage and benefit of using ECC instead of using RSA is that it gives equivalent security for a smaller key, thereby consuming less resource and ameliorating performance on the systems. The basics of elliptic curves and their arithmetic are discussed in this paper. We also present experimental results justifying the benefits of using elliptic curve cryptography over RSA in public cryptosystems.
引用
收藏
页码:13 / 18
页数:6
相关论文
共 50 条
  • [31] On Elliptic Curve Cryptography implementations and evaluation
    Alimi, Nejmeddine
    Lahbib, Younes
    Machhout, Mohsen
    Tourki, Rached
    2016 2ND INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR SIGNAL AND IMAGE PROCESSING (ATSIP), 2016, : 35 - 40
  • [32] Elliptic Curve Cryptography for Ciphering Images
    Gupta, Nikita
    Kundu, Vikas
    Kurra, Neha
    Sharma, Shivani
    Pal, Bhagyashree
    2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,
  • [33] An Enhanced Elliptic Curve Cryptography for Biometric
    Althobaiti, Ohood S.
    Aboalsamh, Hatim A.
    2012 7TH INTERNATIONAL CONFERENCE ON COMPUTING AND CONVERGENCE TECHNOLOGY (ICCCT2012), 2012, : 1048 - 1055
  • [34] A VHDL generator for elliptic curve cryptography
    Järvinen, K
    Tommiska, M
    Skyttä, J
    FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, 2004, 3203 : 1098 - 1100
  • [35] Steganographic manipulations with elliptic curve cryptography
    Shankar, T. N.
    Sahoo, G.
    Niranjan, S.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2012, 4 (04) : 280 - 297
  • [36] Hardware Accelerators for Elliptic Curve Cryptography
    Puttmann, C.
    Shokrollahi, J.
    Porrmann, M.
    Rueckert, U.
    ADVANCES IN RADIO SCIENCE, 2008, 6 : 259 - 264
  • [37] JPEG Image Encryption with Elliptic Curve Cryptography
    Bakhtiari, Saeid
    Ibrahim, Subariah
    Salleh, Mazleena
    Bakhtiari, Majid
    2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 144 - 149
  • [38] Authentication protocol based on elliptic curve cryptography
    Constantinescu, Nicolae
    ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2010, 37 (02): : 83 - 91
  • [39] Generalized Fibonacci Sequences for Elliptic Curve Cryptography
    Cheddour, Zakariae
    Chillali, Abdelhakim
    Mouhib, Ali
    MATHEMATICS, 2023, 11 (22)
  • [40] Customising hardware designs for elliptic curve cryptography
    Telle, N
    Luk, W
    Cheung, RCC
    COMPUTER SYSTEMS: ARCHITECTURES, MODELING, AND SIMULATION, 2004, 3133 : 274 - 283