The State of Elliptic Curve Cryptography

被引:84
|
作者
Neal Koblitz
Alfred Menezes
Scott Vanstone
机构
[1] University of Washington,Dept. of Mathematics
[2] University of Waterloo,Dept. of C&O
来源
关键词
Elliptic curves; public-key cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
Since the introduction of public-key cryptography by Diffie and Hellman in 1976, the potential for the use of the discrete logarithm problem in public-key cryptosystems has been recognized. Although the discrete logarithm problem as first employed by Diffie and Hellman was defined explicitly as the problem of finding logarithms with respect to a generator in the multiplicative group of the integers modulo a prime, this idea can be extended to arbitrary groups and, in particular, to elliptic curve groups. The resulting public-key systems provide relatively small block size, high speed, and high security. This paper surveys the development of elliptic curve cryptosystems from their inception in 1985 by Koblitz and Miller to present day implementations.
引用
收藏
页码:173 / 193
页数:20
相关论文
共 50 条
  • [31] Elliptic Curve Cryptography for Ciphering Images
    Gupta, Nikita
    Kundu, Vikas
    Kurra, Neha
    Sharma, Shivani
    Pal, Bhagyashree
    2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,
  • [32] An Enhanced Elliptic Curve Cryptography for Biometric
    Althobaiti, Ohood S.
    Aboalsamh, Hatim A.
    2012 7TH INTERNATIONAL CONFERENCE ON COMPUTING AND CONVERGENCE TECHNOLOGY (ICCCT2012), 2012, : 1048 - 1055
  • [33] A VHDL generator for elliptic curve cryptography
    Järvinen, K
    Tommiska, M
    Skyttä, J
    FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, 2004, 3203 : 1098 - 1100
  • [34] Steganographic manipulations with elliptic curve cryptography
    Shankar, T. N.
    Sahoo, G.
    Niranjan, S.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2012, 4 (04) : 280 - 297
  • [35] Hardware Accelerators for Elliptic Curve Cryptography
    Puttmann, C.
    Shokrollahi, J.
    Porrmann, M.
    Rueckert, U.
    ADVANCES IN RADIO SCIENCE, 2008, 6 : 259 - 264
  • [36] JPEG Image Encryption with Elliptic Curve Cryptography
    Bakhtiari, Saeid
    Ibrahim, Subariah
    Salleh, Mazleena
    Bakhtiari, Majid
    2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 144 - 149
  • [37] Authentication protocol based on elliptic curve cryptography
    Constantinescu, Nicolae
    ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2010, 37 (02): : 83 - 91
  • [38] Generalized Fibonacci Sequences for Elliptic Curve Cryptography
    Cheddour, Zakariae
    Chillali, Abdelhakim
    Mouhib, Ali
    MATHEMATICS, 2023, 11 (22)
  • [39] Customising hardware designs for elliptic curve cryptography
    Telle, N
    Luk, W
    Cheung, RCC
    COMPUTER SYSTEMS: ARCHITECTURES, MODELING, AND SIMULATION, 2004, 3133 : 274 - 283
  • [40] Implementation of Elliptic Curve Cryptography in Binary Field
    Susantio, D. R.
    Muchtadi-Alamsyah, I.
    4TH INTERNATIONAL CONFERENCE ON SCIENCE & ENGINEERING IN MATHEMATICS, CHEMISTRY AND PHYSICS 2016 (SCIETECH 2016), 2016, 710