Subscribe Now Subscribe Today
Science Alert
Curve Top
Journal of Applied Sciences
  Year: 2005 | Volume: 5 | Issue: 4 | Page No.: 604-633
DOI: 10.3923/jas.2005.604.633
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Theory and Implementation of Elliptic Curve Cryptography

Kefa Rabah

This work describes the mathematics needed to implement Elliptic Curve Cryptography (ECC) with special attention to its implementation in Galois Field. Here the functionality of ECC, its advantages and challenges over other cryptosystems are also explained. Comparison with other cryptographic systems will also be undertaken based on aspects such as efficiency, size of the key needed to attain a certain level of security (this has implications on computational costs and time), known and probable attacks, current and predicted future attacks (based on the current growth of technology) and their prevention techniques. ECC reliability will also be looked into.
PDF Fulltext XML References Citation Report Citation
  •    Compiler Optimization and Plain Text Pre-Processing to Hoist the Height of HIGHT in AVR Platform
  •    Randomness Improvement of AES using MKP
  •    Authentication Time of IEEE 802.15.4 with Multiple-key Protocol Using Distributed Message Authentication Code Algorithm
  •    Automatic Formal Framework of Coercion-resistance in Internet Voting Protocols with CryptoVerif in Computational Model
How to cite this article:

Kefa Rabah , 2005. Theory and Implementation of Elliptic Curve Cryptography. Journal of Applied Sciences, 5: 604-633.

DOI: 10.3923/jas.2005.604.633






Curve Bottom