메뉴 건너뛰기




Volumn , Issue , 2017, Pages

Applications of elliptic curve cryptography: A light introduction to elliptic curves and a survey of their applications

Author keywords

Diffie hellman (DH); Digital signature algorithm (DSA); Elliptic curve cryptography (ECC); Elliptic curve diffie hellman (ECDH); Elliptic curve DSA (ECDSA)

Indexed keywords

AUTHENTICATION; BIOMETRICS; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; GEOMETRY; NETWORK SECURITY; PUBLIC KEY CRYPTOGRAPHY; QUANTUM CRYPTOGRAPHY; SECURITY OF DATA;

EID: 85018313683     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/3064814.3064818     Document Type: Conference Paper
Times cited : (36)

References (30)
  • 1
    • 77954463739 scopus 로고    scopus 로고
    • BookSurge Publishing, Charleston, SC
    • James S. Milne. 2006. Elliptic Curves. BookSurge Publishing, Charleston, SC.
    • (2006) Elliptic Curves
    • Milne, J.S.1
  • 2
    • 0027662341 scopus 로고    scopus 로고
    • Reducing elliptic curve logarithms to logarithms in a finite field
    • (Aug. 2002)
    • Alfred J. Menezes, Tatsuaki Okamoto, and Scot A. Vanstone. 2002. Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field. IEEE Transactions on Information Teory 39, 5 (Aug. 2002), 1639-1646. doi:htps://doi.org/10.1109/18.259647
    • (2002) IEEE Transactions on Information Teory , vol.39 , Issue.5 , pp. 1639-1646
    • Menezes, A.J.1    Okamoto, T.2    Vanstone, S.A.3
  • 3
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • (Jan. 1987)
    • Neal Koblitz. 1987. Elliptic Curve Cryptosystems. Mathematics of Computation 48, 177 (Jan. 1987), 203-209. doi:htps://doi.org/10.1090/S0025-5718-1987-0866109-5
    • (1987) Mathematics of Computation , vol.48 , Issue.177 , pp. 203-209
    • Koblitz, N.1
  • 4
    • 85015402934 scopus 로고
    • Use of elliptic curves in cryptography
    • Springer-Verlag
    • Victor S. Miller. 1985. Use of Elliptic Curves in Cryptography. In CRYPTO '85 Advances in Cryptology. Springer-Verlag, 417-426.
    • (1985) CRYPTO '85 Advances in Cryptology , pp. 417-426
    • Miller, V.S.1
  • 7
    • 33745965912 scopus 로고    scopus 로고
    • Curve25519: New diffie-hellman speed records
    • Springer, Berlin, Heidelberg
    • Daniel J. Bernstein. 2006. Curve25519: New Diffie-Hellman Speed Records. In International Workshop on Public Key Cryptography. Springer, Berlin, Heidelberg, 207-228. doi:htps://doi.org/10.1007/11745853-14
    • (2006) International Workshop on Public Key Cryptography , pp. 207-228
    • Bernstein, D.J.1
  • 11
    • 77954614063 scopus 로고    scopus 로고
    • (December 2016)
    • Alexa. 2016. Alexa Top 500 Global Sites. (December 2016). Retrieved from htp://www.alexa.com/topsites
    • (2016) Alexa Top 500 Global Sites
  • 12
    • 85027710558 scopus 로고    scopus 로고
    • The performance impact of elliptic curve cryptography on DNSSEC validation
    • (Sep. 2016)
    • Roland van Rijswijk-Deij, Kaspar Hageman, Anna Speroto, and Aiko Pras. 2016. The Performance Impact of Elliptic Curve Cryptography on DNSSEC Validation. IEEE/ACM Transactions on Networking PP, 99 (Sep. 2016), 1-13. doi:htps://doi.org/10.1109/TNET.2016.2605767
    • (2016) IEEE/ACM Transactions on Networking , vol.PP , Issue.99 , pp. 1-13
    • Van Rijswijk-Deij, R.1    Hageman, K.2    Speroto, A.3    Pras, A.4
  • 13
    • 85024130760 scopus 로고    scopus 로고
    • An efficient elliptic curve cryptography signature server with GPU acceleration
    • (Aug. 2016)
    • Wuqiong Pan, Fangyu Zheng, Yuan Zhao, Wen-Tao Zhu, and Jiwu Jing. 2016. An Efficient Elliptic Curve Cryptography Signature Server With GPU Acceleration. IEEE Transactions on Information Forensics and Security 12, 1 (Aug. 2016), 111-122. doi:htps://doi.org/10.1109/TIFS.2016.2603974
    • (2016) IEEE Transactions on Information Forensics and Security , vol.12 , Issue.1 , pp. 111-122
    • Pan, W.1    Zheng, F.2    Zhao, Y.3    Zhu, W.-T.4    Jing, J.5
  • 14
    • 85000869991 scopus 로고    scopus 로고
    • A secure anonymous authentication protocol for mobile services on elliptic curve cryptography
    • (July 2016)
    • Alavalapati Goutham Reddy, Ashok Kumar Das, Eun-Jun Yoon, and Kee-Young Yoo. 2016. A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography. IEEE Access 4 (July 2016), 4394-4407. doi:htps://doi.org/10.1109/ACCESS.2016.2596292
    • (2016) IEEE Access , vol.4 , pp. 4394-4407
    • Reddy, A.G.1    Das, A.K.2    Yoon, E.-J.3    Yoo, K.-Y.4
  • 18
    • 84988310659 scopus 로고    scopus 로고
    • Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography
    • (Sep. 2016)
    • Debiao He, Huaqun Wang, Muhammad Khurram Khan, and Lina Wang. 2016. Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography. IET Communications 10, 14 (Sep. 2016), 1795-1802. doi:htps://doi.org/10.1049/iet-com.2016.0091
    • (2016) IET Communications , vol.10 , Issue.14 , pp. 1795-1802
    • He, D.1    Wang, H.2    Khan, M.K.3    Wang, L.4
  • 20
    • 84988835564 scopus 로고    scopus 로고
    • Design and implementation of a new active RFID authentication protocol based on elliptic curve encryption
    • IEEE, London
    • Mustapha Benssalah, Mustapha Djeddou, and Karim Drouiche. 2016. Design and Implementation of a New Active RFID Authentication Protocol Based on Elliptic Curve Encryption. In 2016 SAI Computing Conference (SAI). IEEE, London, 1076-1081. doi:htps://doi.org/10.1109/SAI.2016.7556111
    • (2016) 2016 SAI Computing Conference (SAI) , pp. 1076-1081
    • Benssalah, M.1    Djeddou, M.2    Drouiche, K.3
  • 24
    • 0142051871 scopus 로고    scopus 로고
    • Polynomial-time algorithms for prime factorization and discrete logarithms on a qantum computer
    • (Oct. 1997)
    • Peter W. Shor. 1997. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Qantum Computer. SIAM Journal on Computing 26, 5 (Oct. 1997), 1484-1509. doi:htps://doi.org/10.1137/S0097539795293172
    • (1997) SIAM Journal on Computing , vol.26 , Issue.5 , pp. 1484-1509
    • Shor, P.W.1
  • 25
    • 0035924370 scopus 로고    scopus 로고
    • Experimental realization of shor's quantum factoring algorithm using nuclear magnetic resonance
    • (Dec. 2001)
    • Lieven M. K. Vandersypen, Mathias Steffen, Gregory Breyta, Costantino S. Yannoni, Mark H. Sherwood, and Isaac L. Chuang. 2001. Experimental realization of Shor's quantum factoring algorithm using nuclear magnetic resonance. Nature 414, 6866 (Dec. 2001), 883-887. doi:htps://doi.org/10.1038/414883a
    • (2001) Nature , vol.414 , Issue.6866 , pp. 883-887
    • Lieven, M.1    Vandersypen, K.2    Steffen, M.3    Breyta, G.4    Yannoni, C.S.5    Sherwood, M.H.6    Chuang, I.L.7
  • 27
    • 0141457783 scopus 로고    scopus 로고
    • Shor's discrete logarithm quantum algorithm for elliptic curves
    • (July 2003)
    • John Proos and Christof Zalka. 2003. Shor's discrete logarithm quantum algorithm for elliptic curves. Qantum Information & Computation 3, 4 (July 2003), 317-344.
    • (2003) Qantum Information & Computation , vol.3 , Issue.4 , pp. 317-344
    • Proos, J.1    Zalka, C.2
  • 28
    • 84990890009 scopus 로고    scopus 로고
    • High-performance sofware implementation of discrete Gaussian sampling for latice-based cryptography
    • IEEE, Chongqing
    • Chaohui Du and Guoqiang Ba. 2016. High-Performance Sofware Implementation of Discrete Gaussian Sampling for Latice-Based Cryptography. In 2016 IEEE Information Technology, Networking, Electronic and Automation Control Conference. IEEE, Chongqing, 220-224. doi:htps://doi.org/10.1109/ITNEC.2016.7560353
    • (2016) 2016 IEEE Information Technology, Networking, Electronic and Automation Control Conference , pp. 220-224
    • Du, C.1    Ba, G.2
  • 30


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.