A Critical Review on Elliptic Curve Cryptography

被引:0
|
作者
Singh, Soram Ranbir [1 ]
Khan, Ajoy Kumar [2 ]
Singh, Takhellambam Sonamani [1 ]
机构
[1] Manipur Inst Technol, Imphal, Manipur, India
[2] Assam Univ, Silchar, India
关键词
Elliptic Curve; Cryptography; ECDLP; Encryption; Decryption;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Elliptic curves in the geometric and algebraic parlances have been studied by computer scientists over the last few decades. Elliptic Curve Cryptography or Cryptosystem (ECC) is a public-key cryptosystem. The main advantage and benefit of using ECC instead of using RSA is that it gives equivalent security for a smaller key, thereby consuming less resource and ameliorating performance on the systems. The basics of elliptic curves and their arithmetic are discussed in this paper. We also present experimental results justifying the benefits of using elliptic curve cryptography over RSA in public cryptosystems.
引用
收藏
页码:13 / 18
页数:6
相关论文
共 50 条
  • [41] Implementation of Elliptic Curve Cryptography in Binary Field
    Susantio, D. R.
    Muchtadi-Alamsyah, I.
    4TH INTERNATIONAL CONFERENCE ON SCIENCE & ENGINEERING IN MATHEMATICS, CHEMISTRY AND PHYSICS 2016 (SCIETECH 2016), 2016, 710
  • [42] Design of an Efficient Elliptic Curve Cryptography Coprocessor
    MuthuKumar, B.
    Jeevananthan, Dr. S.
    FIRST INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING 2009 (ICAC 2009), 2009, : 34 - +
  • [43] Digit set randomization in elliptic curve cryptography
    Jao, David
    Raju, S. Ramesh
    Venkatesan, Ramarathnam
    STOCHASTIC ALGORITHMS: FOUNDATIONS AND APPLICATIONS, PROCEEDINGS, 2007, 4665 : 105 - +
  • [44] Efficient Elliptic Curve Cryptography for Embedded Devices
    Liu, Zhe
    Weng, Jian
    Hu, Zhi
    Seo, Hwajeong
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (02)
  • [45] Trading inversions for multiplications in elliptic curve cryptography
    Ciet, M
    Joye, M
    Lauter, K
    Montgomery, PL
    DESIGNS CODES AND CRYPTOGRAPHY, 2006, 39 (02) : 189 - 206
  • [46] Elliptic curve cryptography on a Palm OS device
    Weimerskirch, A
    Paar, C
    Shantz, SC
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 502 - 513
  • [47] The advantages of elliptic curve cryptography for wireless security
    Lauter, K
    IEEE WIRELESS COMMUNICATIONS, 2004, 11 (01): : 62 - 67
  • [48] On the use of weber polynomials in elliptic curve cryptography
    Konstantinou, E
    Stamatiou, YC
    Zaroliagis, C
    PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2004, 3093 : 335 - 349
  • [49] Performance Evaluation of RSA and Elliptic Curve Cryptography
    Singh, Soram Ranbir
    Khan, Ajoy Kumar
    Singh, Soram Rakesh
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2016, : 302 - 306
  • [50] Elliptic Curve Cryptography for Smart Phone OS
    Desai, Sharmishta
    Bedi, R. K.
    Jagdale, B. N.
    Wadhai, V. M.
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 397 - +