Elliptic curve cryptography

Xem 1-18 trên 18 kết quả Elliptic curve cryptography
  • A Hardware Architecture for Elliptic Curve Cryptography and Lossless Data Compression. We present a hardware architecture that combines Elliptic Curve Cryptography (ECC) and lossless data compression in a single chip.

    pdf7p dunglh2013 02-04-2014 45 0   Download

  • The paper gives an introduction to elliptic curve cryptography (ECC) and how it is used in the implementation of digital signature (ECDSA) and key agreement (ECDH) Algorithms. The paper discusses the implementation of ECC on two finite fields, prime field and binary field.

    pdf11p dunglh2013 02-04-2014 28 0   Download

  • This document includes: Introduction to Elliptic Curves, Elliptic Curve Cryptosystems (ECC), Implementation of ECC in Binary Fields.

    pdf14p levuphongqn 18-08-2015 31 5   Download

  • This paper presents an approach related to authenticate mutually a RFID (Radio Frequency Identification) tag from a RFID reader by using the cryptography based on Elliptic curve. Our proposal mutual authentication lies on the Elliptic curve discrete logarithm problem, which is considered the core in order to fight against all of attacks like replay attack, forgery attack and man-in-the-middle attack. Scientifically, we prove not only the accuracy and the security of our approach, but also its performance in the mutual authentication between a RFID tag and a reader. ...

    pdf8p tuanlocmuido 13-12-2012 30 2   Download

  • The paper discusses the implementation of ECC on two finite fields, prime field and binary field. It also gives an overview of ECC implementation on different coordinate systems called the projective coordinate systems.

    pdf11p dunglh2013 02-04-2014 48 2   Download

  • The Elliptic Curve Cryptography (ECC) is evolving as an important cryptography, and shows a promise to be an alternative of RSA. Small size, high security and other features characterize ECC. Based on the theory of ECC, this paper analyzes its advantages over other cryptographies and focuses on its principle.

    pdf4p dunglh2013 02-04-2014 34 1   Download

  • Bài viết này trình bày một thuật toán mã hóa bất đối xứng mới, ưu việt hơn loại thuật toán đang thông dụng nhất hiện nay là RSA. Qua đó, tác giả nêu lên ý tưởng áp dụng thuật toán này vào việc xây dựng một hệ thống bãi giữ xe thông minh – tự động (Smart-Auto Parking) với độ bảo mật cao hơn so với các hệ thống hiện có trên thị trường.

    pdf19p vivatican2711 10-02-2020 34 1   Download

  • We introduce new modulus scaling techniques for transforming a class of primes into special forms which enables efficient arithmetic. The scaling technique may be used to improve multiplication and inversion in finite fields. We present an efficient inversion algorithm that utilizes the structure of scaled modulus.

    pdf15p dunglh2013 02-04-2014 41 0   Download

  • In this paper, we have proposed a Secured password based mutual authentication protocol for client-sever computing using elliptic curve cryptography. The proposed framework provides mutual authentication and session key agreement in client-sever environment. It provides secure communication between client and server with help of user email-id and mobile phone as authentication device for mobile hand held device.

    pdf4p byphasse043256 21-03-2019 7 0   Download

  • In this paper, we present the results of our implementation of elliptic curve cryptography (ECC) over the field GF (p) on an 80-MHz, 32-bit ARM microprocessor. We have produced a practical software library which supports variable length implementation of the elliptic curve digital signature algorithm (ECDSA).

    pdf14p dunglh2013 02-04-2014 37 2   Download

  • The is has many features that make it a unique source for practitioners and students. We focused on practical relevance by introducing most crypto algorithms that are used in modern real-world applications. For every crypto scheme, up-to-date security estimations and key length recommendations are given.

    pdf382p sakuraphuong 23-05-2013 40 8   Download

  • For an equivalent level of security, elliptic curve cryptography uses shorter key sizes and is considered to be an excellent candidate for constrained environments like wireless/mobile communications. In FIPS 186-2, NIST recommends several finite fields to be used in the elliptic curve digital signature algorithm (ECDSA). Of the ten recommended finite fields, five are binary extension fields with degrees ranging from 163 to 571. The fundamental building block of the ECDSA, like any ECC based protocol, is elliptic curve scalar mul- tiplication.

    pdf0p cao_can 02-01-2013 47 4   Download

  • (BQ) The Handbook of information and communication security covers some of the latest advances in fundamentals, cryptography, intrusion detection, access control, networking (including extensive sections on optics and wireless systems), software, forensics, and legal issues. The editors intention, with respect to the presentation and sequencing of the chapters, was to create a reasonably natural flow between the various sub-topics. The book is divided into 2 parts, part 1 from chapter 1 to chapter 20.

    pdf409p tangtuy07 08-04-2016 44 4   Download

  • In this work, we present a survey of efficient techniques for software implementation of finite field arithmetic especially suitable for cryptographic applications.

    pdf30p dunglh2013 02-04-2014 25 0   Download

  • Implementation of the cryptographic algorisms based on elliptic curves (ECs) over VFFs provides significantly higher performance than the implementation of the EC-based algorithms, in which the ECs are defined over the ground fields and extension finite fields of polynomials.

    pdf6p dunglh2013 02-04-2014 38 0   Download

  • The contents of this chapter include all of the following: Diffie-Hellman key exchange, ElGamal cryptography, Elliptic curve cryptography, Pseudorandom Number Generation (PRNG) based on Asymmetric Ciphers.

    ppt54p koxih_kothogmih3 24-08-2020 1 0   Download

  • Objectives of Chapter 1: To define three security goals; to define security attacks that threaten security goals; to define security services and how they are related to the three security goals; to define security mechanisms to provide security services; to introduce two techniques, cryptography and steganography, to implement security mechanisms

    pdf4p levuphongqn 18-08-2015 40 2   Download

  • Recently, identity based cryptography based on pairing operations defined over elliptic curve points has stimulated a significant level of interest in the arithmetic of ternary extension fields, GF (3n ).

    pdf20p dunglh2013 02-04-2014 40 0   Download



p_strKeyword=Elliptic curve cryptography

nocache searchPhinxDoc


Đồng bộ tài khoản