Subscribe Now Subscribe Today
Science Alert
 
Blue
   
Curve Top
Journal of Applied Sciences
  Year: 2005 | Volume: 5 | Issue: 4 | Page No.: 604-633
DOI: 10.3923/jas.2005.604.633
 
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Theory and Implementation of Elliptic Curve Cryptography

Kefa Rabah

Abstract:
This work describes the mathematics needed to implement Elliptic Curve Cryptography (ECC) with special attention to its implementation in Galois Field. Here the functionality of ECC, its advantages and challenges over other cryptosystems are also explained. Comparison with other cryptographic systems will also be undertaken based on aspects such as efficiency, size of the key needed to attain a certain level of security (this has implications on computational costs and time), known and probable attacks, current and predicted future attacks (based on the current growth of technology) and their prevention techniques. ECC reliability will also be looked into.
PDF Fulltext XML References Citation Report Citation
 RELATED ARTICLES:
  •    Compiler Optimization and Plain Text Pre-Processing to Hoist the Height of HIGHT in AVR Platform
  •    Randomness Improvement of AES using MKP
  •    Authentication Time of IEEE 802.15.4 with Multiple-key Protocol Using Distributed Message Authentication Code Algorithm
  •    Automatic Formal Framework of Coercion-resistance in Internet Voting Protocols with CryptoVerif in Computational Model
How to cite this article:

Kefa Rabah , 2005. Theory and Implementation of Elliptic Curve Cryptography. Journal of Applied Sciences, 5: 604-633.

DOI: 10.3923/jas.2005.604.633

URL: https://scialert.net/abstract/?doi=jas.2005.604.633

COMMENT ON THIS PAPER
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 
 
 
 

Curve Bottom