메뉴 건너뛰기




Volumn , Issue , 2013, Pages

Comparison of ECC and RSA algorithm in resource constrained devices

Author keywords

Computation cost; ECC; Public key cryptography; Resource constrained devices; RSA

Indexed keywords


EID: 84894145953     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICITCS.2013.6717816     Document Type: Conference Paper
Times cited : (98)

References (18)
  • 2
    • 70350527706 scopus 로고    scopus 로고
    • [online] Sep 19, 2011, (Accessed: 25 Jun 2013)
    • Certicom research. "The elliptic curve cryptosystem,". Retrived from htttp://www.certicom.com. [online] Sep 19, 2011, (Accessed: 25 Jun 2013).
    • The Elliptic Curve Cryptosystem
  • 3
    • 84871750400 scopus 로고    scopus 로고
    • Smartphone security challenges
    • 58, Dec.
    • Yong Wang; Streff, K.; Raman, S., "Smartphone Security Challenges," Computer, Vol. 45, no. 12, pp. 52, 58, Dec. 2012.
    • (2012) Computer , vol.45 , Issue.12 , pp. 52
    • Wang, Y.1    Streff, K.2    Raman, S.3
  • 6
    • 54049086892 scopus 로고    scopus 로고
    • High-performance architecture of elliptic curve scalar multiplication
    • 1453
    • Ansari, B.; Hasan, M.A. "High-Performance Architecture of Elliptic Curve Scalar Multiplication," Computers, IEEE Transactions, Vol. 57, no. 11, pp. 1443, 1453, 2008.
    • (2008) Computers, IEEE Transactions , vol.57 , Issue.11 , pp. 1443
    • Ansari, B.1    Hasan, M.A.2
  • 8
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir and L. Adleman. "A method for obtaining digital signatures and public-key cryptosystems," Comm. ACM, 21, pp. 120-126, 1978.
    • (1978) Comm. ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 9
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
    • Springer-Verlag
    • P. Kocher. "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems," Advances in Cryptology: Proceeding of CRYPTO '96, Springer-Verlag, pp. 104-113., 1996.
    • (1996) Advances in Cryptology: Proceeding of CRYPTO '96 , pp. 104-113
    • Kocher, P.1
  • 12
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • Koblitz, N. Elliptic curve cryptosystems. Mathematics of computation. No. 48, pp. 203-209, 1987.
    • (1987) Mathematics of Computation , Issue.48 , pp. 203-209
    • Koblitz, N.1
  • 13
    • 0034462158 scopus 로고    scopus 로고
    • Elliptic curve cryptosystem
    • Torri, N. and Yokoyama, K. Elliptic Curve Cryptosystem. FUJITSU Sci. Tech. J., 36(2):140-146, 2000.
    • (2000) FUJITSU Sci. Tech. J. , vol.36 , Issue.2 , pp. 140-146
    • Torri, N.1    Yokoyama, K.2
  • 14
    • 35048831549 scopus 로고    scopus 로고
    • Implementing an efficient elliptic curve cryptosystem over GF(p) on a smart card
    • Hitchcock, Y., Dawson, E., Clark, A. and Montague, P. Implementing an efficient elliptic curve cryptosystem over GF(p) on a smart card. ANZIAM J. 44(E):C354-C377, 2003.
    • (2003) ANZIAM J. , vol.44 , Issue.E
    • Hitchcock, Y.1    Dawson, E.2    Clark, A.3    Montague, P.4
  • 15
    • 1842715081 scopus 로고    scopus 로고
    • The advantages of elliptic curve cryptography for wireless security
    • Lauter, K. The advantages of elliptic curve cryptography for wireless security. IEEE Wireless Communications. pp. 62-67, 2004.
    • (2004) IEEE Wireless Communications , pp. 62-67
    • Lauter, K.1
  • 16
    • 9144256251 scopus 로고    scopus 로고
    • Efficient implementation of elliptic curve cryptography (ECC) for personal digital assistants (PDAs)
    • Dabholkar, A. Yow, K.C. "Efficient Implementation of Elliptic Curve Cryptography (ECC) for Personal Digital Assistants (PDAs), Wireless Personal Communications - WIREL PERS COMMUN,", Vol. 29, pp. 233-246, 2004.
    • (2004) Wireless Personal Communications - WIREL PERS COMMUN , vol.29 , pp. 233-246
    • Dabholkar, A.1    Yow, K.C.2
  • 18
    • 70350679379 scopus 로고    scopus 로고
    • (nsa.gov), [online] Jan 15 (Accessed: 20 July 2013)
    • National Security Agency., "The Case for Elliptic Curve Cryptography,", (nsa.gov), [online] Jan 15, 2009, http://www.nsa.gov/ business/programs/elliptic-curve.shtml, (Accessed: 20 July 2013)
    • (2009) The Case for Elliptic Curve Cryptography


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.