scispace - formally typeset
Journal ArticleDOI

A practical authenticated encryption scheme based on the elliptic curve cryptosystem

Reads0
Chats0
TLDR
These techniques—encryption, decryption and digital signature—are integrated in a new authenticated encryption scheme based on the elliptic curve cryptosystem, to achieve the confidentiality and authenticity of information.
About
This article is published in Computer Standards & Interfaces.The article was published on 2004-09-01. It has received 11 citations till now. The article focuses on the topics: Authenticated encryption & Cryptosystem.

read more

Citations
More filters
Journal ArticleDOI

Threshold Signatures: Current Status and Key Issues

TL;DR: There is an ideal threshold signature scheme which satisfies all requirements of threshold signature schemes and readers can easily to understand what the next generation of thresholds signature schemes is and attempt to propose it.
Journal ArticleDOI

A novel application of grey system theory to information security (Part I)

TL;DR: This study applies the grey data generating techniques in grey system theory on a novel cryptosystem, which is guiding a new research in the field of information security, to obtain a cryptos system with lock generation and sum-difference mixed ladder.
Proceedings ArticleDOI

Elliptic curve cryptography: survey and its security applications

TL;DR: Due to its computational benefits such as faster computation, low power and memory consumption, bandwidth saving, and survey of various protocols based on ECC which clearly depicts its increasing acceptance over other public key cryptosystems.
Journal ArticleDOI

New Public-Key Cryptosystem Based on Two-Dimension DLP

TL;DR: Experimental results and theoretical analyses show that the new public-key cryptosystem possesses the advantages of the outstanding robustness, short key length, high security and encrypting many data once.
Book ChapterDOI

Elliptic Curve Cryptography: Current Status and Research Challenges

TL;DR: A comparison of ECC with conventional public key systems reveals that ECC is best suited for applications such as mobile computing, wireless sensor networks and other devices with constrained resources.
References
More filters
Journal ArticleDOI

Elliptic curve cryptosystems

TL;DR: The question of primitive points on an elliptic curve modulo p is discussed, and a theorem on nonsmoothness of the order of the cyclic subgroup generated by a global point is given.
Book

Elliptic Curves in Cryptography

TL;DR: In the past few years elliptic curve cryptography has moved from a fringe activity to a major challenger to the dominant RSA/DSA systems as mentioned in this paper, and it has become all pervasive.
Journal ArticleDOI

Reducing elliptic curve logarithms to logarithms in a finite field

TL;DR: The main result of the paper is to demonstrate the reduction of the elliptic curve logarithm problem to the logarathm problem in the multiplicative group of an extension of the underlying finite field, thus providing a probabilistic subexponential time algorithm for the former problem.
Journal ArticleDOI

The State of Elliptic Curve Cryptography

TL;DR: This paper surveys the development of elliptic curve cryptosystems from their inception in 1985 by Koblitz and Miller to present day implementations.
Journal ArticleDOI

Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem

TL;DR: The purpose of this paper is to show that the message recovery feature is independent of the choice of the signature equation and that all ElGamal-type schemes have variants giving message recovery, and that with DLP-based schemes the same functionality as with RSA can be obtained.
Related Papers (5)