Elliptic curve cryptography on constraint environments

被引:0
|
作者
de Santos, MD [1 ]
Sanchez-Avila, C [1 ]
Sanchez-Reillo, R [1 ]
机构
[1] Univ Politecn Madrid, ETSI Telecommun, Dpto Matemat Aplicada, E-28040 Madrid, Spain
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The main target of this work is to expose the capacities that make elliptic curve cryptography the most suitable one to be implemented in environments with several constraints related to processor speed, bandwidth, security and memory. We have analyzed several elliptic curve cryptosystems with other public key ones. We have made a comparison among different public key cryptosystems (such as ElGamal for encryption and Diffie-Hellman for key exchanging) and the corresponding ones based on elliptic curve theory; highlighting algorithm speed characteristics.
引用
收藏
页码:212 / 220
页数:9
相关论文
共 50 条
  • [41] A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography
    Chunhua Jin
    Chunxiang Xu
    Xiaojun Zhang
    Jining Zhao
    Journal of Medical Systems, 2015, 39
  • [42] ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things
    Majumder, Suman
    Ray, Sangram
    Sadhukhan, Dipanwita
    Khan, Muhammad Khurram
    Dasgupta, Mou
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (03) : 1867 - 1896
  • [43] ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things
    Suman Majumder
    Sangram Ray
    Dipanwita Sadhukhan
    Muhammad Khurram Khan
    Mou Dasgupta
    Wireless Personal Communications, 2021, 116 : 1867 - 1896
  • [44] A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography
    Jin, Chunhua
    Xu, Chunxiang
    Zhang, Xiaojun
    Zhao, Jining
    JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (03)
  • [45] Authentication protocol based on elliptic curve cryptography
    Constantinescu, Nicolae
    ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2010, 37 (02): : 83 - 91
  • [46] JPEG Image Encryption with Elliptic Curve Cryptography
    Bakhtiari, Saeid
    Ibrahim, Subariah
    Salleh, Mazleena
    Bakhtiari, Majid
    2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 144 - 149
  • [47] Design of an Efficient Elliptic Curve Cryptography Coprocessor
    MuthuKumar, B.
    Jeevananthan, Dr. S.
    FIRST INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING 2009 (ICAC 2009), 2009, : 34 - +
  • [48] Generalized Fibonacci Sequences for Elliptic Curve Cryptography
    Cheddour, Zakariae
    Chillali, Abdelhakim
    Mouhib, Ali
    MATHEMATICS, 2023, 11 (22)
  • [49] Customising hardware designs for elliptic curve cryptography
    Telle, N
    Luk, W
    Cheung, RCC
    COMPUTER SYSTEMS: ARCHITECTURES, MODELING, AND SIMULATION, 2004, 3133 : 274 - 283
  • [50] Implementation of Elliptic Curve Cryptography in Binary Field
    Susantio, D. R.
    Muchtadi-Alamsyah, I.
    4TH INTERNATIONAL CONFERENCE ON SCIENCE & ENGINEERING IN MATHEMATICS, CHEMISTRY AND PHYSICS 2016 (SCIETECH 2016), 2016, 710