Journal ArticleDOI
A practical authenticated encryption scheme based on the elliptic curve cryptosystem
Reads0
Chats0
TLDR
These techniques—encryption, decryption and digital signature—are integrated in a new authenticated encryption scheme based on the elliptic curve cryptosystem, to achieve the confidentiality and authenticity of information.About:
This article is published in Computer Standards & Interfaces.The article was published on 2004-09-01. It has received 11 citations till now. The article focuses on the topics: Authenticated encryption & Cryptosystem.read more
Citations
More filters
Journal ArticleDOI
Threshold Signatures: Current Status and Key Issues
Min-Shiang Hwang,Ting-Yi Chang +1 more
TL;DR: There is an ideal threshold signature scheme which satisfies all requirements of threshold signature schemes and readers can easily to understand what the next generation of thresholds signature schemes is and attempt to propose it.
Journal ArticleDOI
A novel application of grey system theory to information security (Part I)
TL;DR: This study applies the grey data generating techniques in grey system theory on a novel cryptosystem, which is guiding a new research in the field of information security, to obtain a cryptos system with lock generation and sum-difference mixed ladder.
Proceedings ArticleDOI
Elliptic curve cryptography: survey and its security applications
Sheetal Kalra,Sandeep K. Sood +1 more
TL;DR: Due to its computational benefits such as faster computation, low power and memory consumption, bandwidth saving, and survey of various protocols based on ECC which clearly depicts its increasing acceptance over other public key cryptosystems.
Journal ArticleDOI
New Public-Key Cryptosystem Based on Two-Dimension DLP
TL;DR: Experimental results and theoretical analyses show that the new public-key cryptosystem possesses the advantages of the outstanding robustness, short key length, high security and encrypting many data once.
Book ChapterDOI
Elliptic Curve Cryptography: Current Status and Research Challenges
Sheetal Kalra,Sandeep K. Sood +1 more
TL;DR: A comparison of ECC with conventional public key systems reveals that ECC is best suited for applications such as mobile computing, wireless sensor networks and other devices with constrained resources.
References
More filters
Journal ArticleDOI
Elliptic curve cryptosystems
TL;DR: The question of primitive points on an elliptic curve modulo p is discussed, and a theorem on nonsmoothness of the order of the cyclic subgroup generated by a global point is given.
Book
Elliptic Curves in Cryptography
TL;DR: In the past few years elliptic curve cryptography has moved from a fringe activity to a major challenger to the dominant RSA/DSA systems as mentioned in this paper, and it has become all pervasive.
Journal ArticleDOI
Reducing elliptic curve logarithms to logarithms in a finite field
TL;DR: The main result of the paper is to demonstrate the reduction of the elliptic curve logarithm problem to the logarathm problem in the multiplicative group of an extension of the underlying finite field, thus providing a probabilistic subexponential time algorithm for the former problem.
Journal ArticleDOI
The State of Elliptic Curve Cryptography
TL;DR: This paper surveys the development of elliptic curve cryptosystems from their inception in 1985 by Koblitz and Miller to present day implementations.
Journal ArticleDOI
Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem
Kaisa Nyberg,Rainer A. Rueppel +1 more
TL;DR: The purpose of this paper is to show that the message recovery feature is independent of the choice of the signature equation and that all ElGamal-type schemes have variants giving message recovery, and that with DLP-based schemes the same functionality as with RSA can be obtained.
Related Papers (5)
Method of constructing elliptic curve authenticated encryption scheme
Ze-Mao Zhao,Feng-Yu Liu +1 more