메뉴 건너뛰기




Volumn , Issue , 2011, Pages 102-106

Elliptic curve cryptography: Survey and its security applications

Author keywords

authentication; cryptography; digital signatures; elliptic curve cryptography; encryption decryption; key exchange; mobile devices; smart cards; wireless sensor networks

Indexed keywords

DIGITAL SIGNATURE; ELLIPTIC CURVE CRYPTOGRAPHY; ENCRYPTION/DECRYPTION; KEY EXCHANGE; WIRELESS SENSOR;

EID: 80052326400     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2007052.2007073     Document Type: Conference Paper
Times cited : (20)

References (25)
  • 2
    • 0035898884 scopus 로고    scopus 로고
    • Cryptography on smart cards
    • Elsevier
    • Borst, J., Bart P., Rijmen.: Cryptography on smart cards. Elsevier, J. Computer Networks, vol. 36, pp. 423-435 (2001).
    • (2001) J. Computer Networks , vol.36 , pp. 423-435
    • Borst, J.1    Rijmen, B.P.2
  • 3
    • 4043064180 scopus 로고    scopus 로고
    • A specifiable verifier group-oriented threshold signature scheme based on the elliptic curve cryptosystem
    • Elsevier
    • Chen, T.S.: A specifiable verifier group-oriented threshold signature scheme based on the elliptic curve cryptosystem. Elsevier, J. Computer Standards & Interface, vol. 27, pp. 33-38 (2004).
    • (2004) J. Computer Standards & Interface , vol.27 , pp. 33-38
    • Chen, T.S.1
  • 4
    • 0142007147 scopus 로고    scopus 로고
    • Efficient proxy multisignature scheme based on the elliptic curve cryptosystem
    • Elsevier
    • Chen, T.S., Chung Y.F., Huang G.S.: Efficient proxy multisignature scheme based on the elliptic curve cryptosystem, Elsevier, Computer & Society, vol. 22, no. 6, pp. 527-534, (2003).
    • (2003) Computer & Society , vol.22 , Issue.6 , pp. 527-534
    • Chen, T.S.1    Chung, Y.F.2    Huang, G.S.3
  • 5
    • 2342473366 scopus 로고    scopus 로고
    • A practical authenticated encryption scheme based on the elliptic curve cryptosystems
    • Chen T.S., Huang K.H., Chung Y.F.: A practical authenticated encryption scheme based on the elliptic curve cryptosystems. J. Computer Standards & Interface vol. 26, pp. 461-469 (2004).
    • (2004) J. Computer Standards & Interface , vol.26 , pp. 461-469
    • Chen, T.S.1    Huang, K.H.2    Chung, Y.F.3
  • 6
    • 34948898634 scopus 로고    scopus 로고
    • Access control in user hierarchy based on elliptic curve cryptosystem
    • Elsevier
    • Chung, Y.F., Lee H.H., Lai, F., Chen, T. S.: Access control in user hierarchy based on elliptic curve cryptosystem. Elsevier, J. Information Sciences, vol. 178, pp. 230-243 (2008).
    • (2008) J. Information Sciences , vol.178 , pp. 230-243
    • Chung, Y.F.1    Lee, H.H.2    Lai, F.3    Chen, T.S.4
  • 7
    • 57349175668 scopus 로고    scopus 로고
    • New stream ciphers based on elliptic curve point multiplication
    • Elsevier
    • Deephti, P.P., Sathidevi P.S.: New stream ciphers based on elliptic curve point multiplication. Elsevier, J. Computer and Communication, vol. 32, pp. 25-33, (2009).
    • (2009) J. Computer and Communication , vol.32 , pp. 25-33
    • Deephti, P.P.1    Sathidevi, P.S.2
  • 8
    • 0344512405 scopus 로고    scopus 로고
    • Generalization of proxy signature based on elliptic curves
    • Elsevier
    • Hwang, M.S., Tzeng, S.F., Tsai C.S.: Generalization of proxy signature based on elliptic curves. Elsevier, J. Computer Standards & Interface, vol. 26, pp. 73-84 (2004).
    • (2004) J. Computer Standards & Interface , vol.26 , pp. 73-84
    • Hwang, M.S.1    Tzeng, S.F.2    Tsai, C.S.3
  • 9
    • 62549133356 scopus 로고    scopus 로고
    • Robust and Efficient Password -Authenticated Key Agreement Using Smart Cards
    • Juang, W.S., Chen, S.T., Liaw, H.T.: Robust and Efficient Password -Authenticated Key Agreement Using Smart Cards. IEEE Transactions on Industrial Electronics, vol.55, no.6. (2008).
    • (2008) IEEE Transactions on Industrial Electronics , vol.55 , Issue.6
    • Juang, W.S.1    Chen, S.T.2    Liaw, H.T.3
  • 10
    • 33745856988 scopus 로고    scopus 로고
    • An efficient key management scheme for hierarchical access control based on elliptic curve cryptosystems
    • Elsevier
    • Jeng, F.G., Wang C.M.: An efficient key management scheme for hierarchical access control based on elliptic curve cryptosystems. Elsevier, J. Systems and Software, vol. 79, pp. 1161-1167 (2006).
    • (2006) J. Systems and Software , vol.79 , pp. 1161-1167
    • Jeng, F.G.1    Wang, C.M.2
  • 12
    • 66249144693 scopus 로고    scopus 로고
    • Efficient Region Based Group Key Agreement Protocol for Ad Hoc Networks using Elliptic Curve Cryptography
    • IEEE
    • Kumar. K., Sumathy. V., Begum J.N.: Efficient Region Based Group Key Agreement Protocol for Ad Hoc Networks using Elliptic Curve Cryptography. IEEE, International Advance Computing Conference (2009)
    • International Advance Computing Conference (2009)
    • Kumar, K.1    Sumathy, V.2    Begum, J.N.3
  • 13
    • 74149091306 scopus 로고    scopus 로고
    • A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves
    • Elsevier
    • Liao, Y. P., Wang S. S.: A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves. Elsevier, J. Computer and Communications, vol. 33, pp. 372-380 (2010).
    • (2010) J. Computer and Communications , vol.33 , pp. 372-380
    • Liao, Y.P.1    Wang, S.S.2
  • 14
    • 77956061440 scopus 로고    scopus 로고
    • Efficient utilization of elliptic curve cryptosystem for hierarchical access control
    • Elsevier
    • Nikooghadam, M., Zakerolhosseini, A., Moghaddam M. E.: Efficient utilization of elliptic curve cryptosystem for hierarchical access control. Elsevier, J. Systems and Software, vol. 83, pp. 1917-1929 (2010).
    • (2010) J. Systems and Software , vol.83 , pp. 1917-1929
    • Nikooghadam, M.1    Zakerolhosseini, A.2    Moghaddam, M.E.3
  • 15
    • 77957230388 scopus 로고    scopus 로고
    • Private key agreement and secure communication for heterogeneous sensor networks
    • Elsevier
    • Rahman, M. M., El-Khatib, K.: Private key agreement and secure communication for heterogeneous sensor networks. Elsevier, J. Parallel and Distributed Computing. vol. 70 , pp. 858-870(2010)
    • (2010) J. Parallel and Distributed Computing , vol.70 , pp. 858-870
    • Rahman, M.M.1    El-Khatib, K.2
  • 18
    • 0344081218 scopus 로고    scopus 로고
    • Digital Signatures with message recovery and its variants based on elliptic curve discrete logarithm problem
    • Elsevier
    • Tzeng, S.F., Hwang M.S.: Digital Signatures with message recovery and its variants based on elliptic curve discrete logarithm problem. Elsevier, J. Computer Standards & Interface, vol. 26, pp. 61-71 (2004).
    • (2004) J. Computer Standards & Interface , vol.26 , pp. 61-71
    • Tzeng, S.F.1    Hwang, M.S.2
  • 19
    • 80052311077 scopus 로고    scopus 로고
    • A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie-Hellman and dynamic key changes
    • Elsevier In Press
    • Wang, C.H., Liu, Y.S.: A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie-Hellman and dynamic key changes. Elsevier In Press, J. Network and Computer Applications (2010).
    • (2010) J. Network and Computer Applications
    • Wang, C.H.1    Liu, Y.S.2
  • 20
    • 42549111729 scopus 로고    scopus 로고
    • The Performance of Elliptic Curve Based Group Diffie-Hellman Protocols for Secure Group Communication over Ad Hoc Networks
    • IEEE
    • Wang, Y., Ramamurthy, B., Zou, X.: The Performance of Elliptic Curve Based Group Diffie-Hellman Protocols for Secure Group Communication over Ad Hoc Networks. IEEE, International Conference on Communication (2006).
    • International Conference on Communication (2006)
    • Wang, Y.1    Ramamurthy, B.2    Zou, X.3
  • 21
    • 80052317907 scopus 로고    scopus 로고
    • A new provably secure authentication and key agreement protocol for SIP using ECC
    • Elsevier In Press
    • Wu, L., Zhang Y., Wang F.: A new provably secure authentication and key agreement protocol for SIP using ECC. Elsevier In Press, J. Computer Standard & Interface.(2008)
    • (2008) J. Computer Standard & Interface
    • Wu, L.1    Zhang, Y.2    Wang, F.3
  • 22
    • 63049116480 scopus 로고    scopus 로고
    • An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystems
    • Elsevier
    • Yang, J. H., Chang C.C.: An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystems. Elsevier , J. Computer & Security , vol. 28, pp. 138-143 (2009)
    • (2009) J. Computer & Security , vol.28 , pp. 138-143
    • Yang, J.H.1    Chang, C.C.2
  • 23
    • 68949161753 scopus 로고    scopus 로고
    • An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments
    • Yang, J. H., Chang C.C.: An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. J. Systems and Software. vol. 82, pp. 1497-1502 (2009)
    • (2009) J. Systems and Software , vol.82 , pp. 1497-1502
    • Yang, J.H.1    Chang, C.C.2
  • 25
    • 0040712314 scopus 로고    scopus 로고
    • How to construct efficient signcryption scheme on elliptic curves
    • Elsevier
    • Zheng, Y., Imai H.: How to construct efficient signcryption scheme on elliptic curves. Elsevier, J. Information Processing Letters vol. 68 pp. 227-233 (1998).
    • (1998) J. Information Processing Letters , vol.68 , pp. 227-233
    • Zheng, Y.1    Imai, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.