Results 281 to 290 of about 24,925 (334)
Some of the next articles are maybe not open access.
2020
Elliptic curve cryptography is an important class of algorithms. There are currently implementations of elliptic curve being used in digital certificates and for key exchange. This class of algorithms provides robust security but with a substantially smaller key than RSA. In this chapter, we explore the basics of elliptic curve cryptography.
Marius Iulian Mihailescu +1 more
openaire +2 more sources
Elliptic curve cryptography is an important class of algorithms. There are currently implementations of elliptic curve being used in digital certificates and for key exchange. This class of algorithms provides robust security but with a substantially smaller key than RSA. In this chapter, we explore the basics of elliptic curve cryptography.
Marius Iulian Mihailescu +1 more
openaire +2 more sources
Elliptic Curve Cryptography Engineering
Proceedings of the IEEE, 2006In recent years, elliptic curve cryptography (ECC) has gained widespread exposure and acceptance, and has already been included in many security standards. Engineering of ECC is a complex, interdisciplinary research field encompassing such fields as mathematics, computer science, and electrical engineering.
CILARDO, Alessandro +3 more
openaire +3 more sources
2021
In this chapter, we briefly motivate the use of asymmetric cryptography based on ECC systems for applications in resource-constrained devices like flash memory controllers. We review applications and fundamentals of elliptic curve cryptography, the corresponding one-way function, i.e. the so-called PM, as well as associated group laws.
+4 more sources
In this chapter, we briefly motivate the use of asymmetric cryptography based on ECC systems for applications in resource-constrained devices like flash memory controllers. We review applications and fundamentals of elliptic curve cryptography, the corresponding one-way function, i.e. the so-called PM, as well as associated group laws.
+4 more sources
1999 Information Theory and Networking Workshop (Cat. No.99EX371), 2003
Elliptic curve (EC) public key cryptosystems were proposed independently in 1985 by Victor Miller and Neal Koblitz and are gaining favor as an efficient and attractive alternative to the more conventional public key cryptosystems (e.g., RSA) in some applications.
openaire +1 more source
Elliptic curve (EC) public key cryptosystems were proposed independently in 1985 by Victor Miller and Neal Koblitz and are gaining favor as an efficient and attractive alternative to the more conventional public key cryptosystems (e.g., RSA) in some applications.
openaire +1 more source
Proceedings of the International Conference on Advances in Computing and Artificial Intelligence, 2011
Elliptic curve cryptosystems are based on ECDLP (Elliptic curve discrete logarithm problem) for their security. The best known method to solve ECDLP (pollard's rho algorithm) is fully exponential therefore Elliptic Curve Cryptosystems require substantially smaller key sizes for equivalent security as compared to other public key cryptosystems (RSA, DSA)
Sheetal Kalra, Sandeep K. Sood
openaire +1 more source
Elliptic curve cryptosystems are based on ECDLP (Elliptic curve discrete logarithm problem) for their security. The best known method to solve ECDLP (pollard's rho algorithm) is fully exponential therefore Elliptic Curve Cryptosystems require substantially smaller key sizes for equivalent security as compared to other public key cryptosystems (RSA, DSA)
Sheetal Kalra, Sandeep K. Sood
openaire +1 more source
Proceedings of the 1st annual conference on Information security curriculum development, 2004
The use of Java in developing commercial Internet applications is growing very rapidly. A major requirement for e-commerce applications is the provision of security. In this work we consider Elliptic Curve Cryptography (ECC) because of the high level of security it provides with small key sizes.
openaire +1 more source
The use of Java in developing commercial Internet applications is growing very rapidly. A major requirement for e-commerce applications is the provision of security. In this work we consider Elliptic Curve Cryptography (ECC) because of the high level of security it provides with small key sizes.
openaire +1 more source

