Elliptic curve cryptography on constraint environments

被引:0
|
作者
de Santos, MD [1 ]
Sanchez-Avila, C [1 ]
Sanchez-Reillo, R [1 ]
机构
[1] Univ Politecn Madrid, ETSI Telecommun, Dpto Matemat Aplicada, E-28040 Madrid, Spain
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The main target of this work is to expose the capacities that make elliptic curve cryptography the most suitable one to be implemented in environments with several constraints related to processor speed, bandwidth, security and memory. We have analyzed several elliptic curve cryptosystems with other public key ones. We have made a comparison among different public key cryptosystems (such as ElGamal for encryption and Diffie-Hellman for key exchanging) and the corresponding ones based on elliptic curve theory; highlighting algorithm speed characteristics.
引用
收藏
页码:212 / 220
页数:9
相关论文
共 50 条
  • [31] A Critical Review on Elliptic Curve Cryptography
    Singh, Soram Ranbir
    Khan, Ajoy Kumar
    Singh, Takhellambam Sonamani
    2016 INTERNATIONAL CONFERENCE ON AUTOMATIC CONTROL AND DYNAMIC OPTIMIZATION TECHNIQUES (ICACDOT), 2016, : 13 - 18
  • [32] On Elliptic Curve Cryptography implementations and evaluation
    Alimi, Nejmeddine
    Lahbib, Younes
    Machhout, Mohsen
    Tourki, Rached
    2016 2ND INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR SIGNAL AND IMAGE PROCESSING (ATSIP), 2016, : 35 - 40
  • [33] A VHDL generator for elliptic curve cryptography
    Järvinen, K
    Tommiska, M
    Skyttä, J
    FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, 2004, 3203 : 1098 - 1100
  • [34] Elliptic Curve Cryptography for Ciphering Images
    Gupta, Nikita
    Kundu, Vikas
    Kurra, Neha
    Sharma, Shivani
    Pal, Bhagyashree
    2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,
  • [35] Hardware Accelerators for Elliptic Curve Cryptography
    Puttmann, C.
    Shokrollahi, J.
    Porrmann, M.
    Rueckert, U.
    ADVANCES IN RADIO SCIENCE, 2008, 6 : 259 - 264
  • [36] Steganographic manipulations with elliptic curve cryptography
    Shankar, T. N.
    Sahoo, G.
    Niranjan, S.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2012, 4 (04) : 280 - 297
  • [37] An Enhanced Elliptic Curve Cryptography for Biometric
    Althobaiti, Ohood S.
    Aboalsamh, Hatim A.
    2012 7TH INTERNATIONAL CONFERENCE ON COMPUTING AND CONVERGENCE TECHNOLOGY (ICCCT2012), 2012, : 1048 - 1055
  • [38] Security and Performance of Elliptic Curve Cryptography in Resource-limited Environments: A Comparative Study
    Raya, Ali
    Mariyappn, K.
    INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST-2020), 2020, : 121 - 128
  • [39] Combining Elliptic Curve Cryptography and Blockchain Technology to Secure Data Storage in Cloud Environments
    Benmenzer, Faiza
    Beghdad, Rachid
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2022, 16 (01)
  • [40] Workload characterization of elliptic curve cryptography and other network security algorithms for constrained environments
    Fiskiran, AM
    Lee, RB
    2002 IEEE INTERNATIONAL WORKSHOP ON WORKLOAD CHARACTERIZATION, 2002, : 127 - 137