Elliptic curve cryptography

A Hardware Architecture for Elliptic Curve Cryptography and Lossless Data Compression. We present a hardware architecture that combines Elliptic Curve Cryptography (ECC) and lossless data compression in a single chip.
7p dunglh2013 02042014 23 0 Download

The paper gives an introduction to elliptic curve cryptography (ECC) and how it is used in the implementation of digital signature (ECDSA) and key agreement (ECDH) Algorithms. The paper discusses the implementation of ECC on two finite fields, prime field and binary field.
11p dunglh2013 02042014 10 0 Download

This paper presents an approach related to authenticate mutually a RFID (Radio Frequency Identification) tag from a RFID reader by using the cryptography based on Elliptic curve. Our proposal mutual authentication lies on the Elliptic curve discrete logarithm problem, which is considered the core in order to fight against all of attacks like replay attack, forgery attack and maninthemiddle attack. Scientifically, we prove not only the accuracy and the security of our approach, but also its performance in the mutual authentication between a RFID tag and a reader. ...
8p tuanlocmuido 13122012 15 2 Download

This document includes: Introduction to Elliptic Curves, Elliptic Curve Cryptosystems (ECC), Implementation of ECC in Binary Fields.
14p levuphongqn 18082015 7 2 Download

The paper discusses the implementation of ECC on two finite fields, prime field and binary field. It also gives an overview of ECC implementation on different coordinate systems called the projective coordinate systems.
11p dunglh2013 02042014 16 1 Download

We introduce new modulus scaling techniques for transforming a class of primes into special forms which enables eﬃcient arithmetic. The scaling technique may be used to improve multiplication and inversion in ﬁnite ﬁelds. We present an eﬃcient inversion algorithm that utilizes the structure of scaled modulus.
15p dunglh2013 02042014 15 0 Download

The Elliptic Curve Cryptography (ECC) is evolving as an important cryptography, and shows a promise to be an alternative of RSA. Small size, high security and other features characterize ECC. Based on the theory of ECC, this paper analyzes its advantages over other cryptographies and focuses on its principle.
4p dunglh2013 02042014 15 0 Download

Lecture 14: Elliptic curve cryptography and digital rights management. The goals of this chapter are: Introduction to elliptic curves, a group structure imposed on the points on an elliptic curve, geometric and algebraic interpretations of the group operator, elliptic curves on prime finite fields, Perl and Python implementations for elliptic curves on prime finite fields,...
82p nhanmotchut_5 03112016 0 0 Download

In this paper, we present the results of our implementation of elliptic curve cryptography (ECC) over the ﬁeld GF (p) on an 80MHz, 32bit ARM microprocessor. We have produced a practical software library which supports variable length implementation of the elliptic curve digital signature algorithm (ECDSA).
14p dunglh2013 02042014 14 1 Download

For an equivalent level of security, elliptic curve cryptography uses shorter key sizes and is considered to be an excellent candidate for constrained environments like wireless/mobile communications. In FIPS 1862, NIST recommends several ﬁnite ﬁelds to be used in the elliptic curve digital signature algorithm (ECDSA). Of the ten recommended ﬁnite ﬁelds, ﬁve are binary extension ﬁelds with degrees ranging from 163 to 571. The fundamental building block of the ECDSA, like any ECC based protocol, is elliptic curve scalar mul tiplication.
0p cao_can 02012013 21 3 Download

(BQ) The Handbook of information and communication security covers some of the latest advances in fundamentals, cryptography, intrusion detection, access control, networking (including extensive sections on optics and wireless systems), software, forensics, and legal issues. The editors intention, with respect to the presentation and sequencing of the chapters, was to create a reasonably natural flow between the various subtopics. The book is divided into 2 parts, part 1 from chapter 1 to chapter 20.
409p tangtuy07 08042016 12 1 Download

In this work, we present a survey of efﬁcient techniques for software implementation of ﬁnite ﬁeld arithmetic especially suitable for cryptographic applications.
30p dunglh2013 02042014 8 0 Download

Implementation of the cryptographic algorisms based on elliptic curves (ECs) over VFFs provides signiﬁcantly higher performance than the implementation of the ECbased algorithms, in which the ECs are deﬁned over the ground ﬁelds and extension ﬁnite ﬁelds of polynomials.
6p dunglh2013 02042014 9 0 Download

Objectives of Chapter 1: To define three security goals; to define security attacks that threaten security goals; to define security services and how they are related to the three security goals; to define security mechanisms to provide security services; to introduce two techniques, cryptography and steganography, to implement security mechanisms
4p levuphongqn 18082015 8 2 Download

Recently, identity based cryptography based on pairing operations deﬁned over elliptic curve points has stimulated a signiﬁcant level of interest in the arithmetic of ternary extension ﬁelds, GF (3n ).
20p dunglh2013 02042014 18 0 Download