Anomalous Behaviour of Cryptographic Elliptic Curves over Finite Field
dc.contributor.author | Fujdiak, Radek | cs |
dc.contributor.author | Dzurenda, Petr | cs |
dc.contributor.author | Mlýnek, Petr | cs |
dc.contributor.author | Mišurec, Jiří | cs |
dc.contributor.author | Orgoň, Miloš | cs |
dc.contributor.author | Bezzateev, Sergey | cs |
dc.coverage.issue | 5 | cs |
dc.coverage.volume | 23 | cs |
dc.date.accessioned | 2021-10-01T06:53:18Z | |
dc.date.available | 2021-10-01T06:53:18Z | |
dc.date.issued | 2017-10-22 | cs |
dc.description.abstract | New wireless technologies and approaches enable to connect even the simplest sensors with limited computational power to the global network. The need for efficient and secure solutions is growing with the wider use of these devices. This paper provides a new method for speed optimization of Elliptic Curve Cryptography operations which are frequently used in the light-weight secure communication algorithms. This method is based on the anomalous behaviour of specific elliptic curves. We analyse more than 60 curves of various international standards. Further, our method is less complex, easy to deploy and comparable effective as ordinary, more complex methods. Last but not least, we show the importance of future research in the area of elliptic curve parameterization. | en |
dc.format | text | cs |
dc.format.extent | 82-88 | cs |
dc.format.mimetype | application/pdf | cs |
dc.identifier.citation | Elektronika Ir Elektrotechnika. 2017, vol. 23, issue 5, p. 82-88. | en |
dc.identifier.doi | 10.5755/j01.eie.23.5.19248 | cs |
dc.identifier.issn | 1392-1215 | cs |
dc.identifier.other | 137850 | cs |
dc.identifier.uri | http://hdl.handle.net/11012/201699 | |
dc.language.iso | en | cs |
dc.publisher | Kaunas University of Technology | cs |
dc.relation.ispartof | Elektronika Ir Elektrotechnika | cs |
dc.relation.uri | http://eejournal.ktu.lt/index.php/elt/article/view/19248/9031 | cs |
dc.rights | Creative Commons Attribution 4.0 International | cs |
dc.rights.access | openAccess | cs |
dc.rights.sherpa | http://www.sherpa.ac.uk/romeo/issn/1392-1215/ | cs |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | cs |
dc.subject | Cryptography | en |
dc.subject | Data Security | en |
dc.subject | Elliptic Curves | en |
dc.subject | Information Security. | en |
dc.title | Anomalous Behaviour of Cryptographic Elliptic Curves over Finite Field | en |
dc.type.driver | article | en |
dc.type.status | Peer-reviewed | en |
dc.type.version | publishedVersion | en |
sync.item.dbid | VAV-137850 | en |
sync.item.dbtype | VAV | en |
sync.item.insts | 2021.10.01 08:53:18 | en |
sync.item.modts | 2021.10.01 08:14:10 | en |
thesis.grantor | Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií. Ústav telekomunikací | cs |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- 19248Article Text5723611020171018.pdf
- Size:
- 646.29 KB
- Format:
- Adobe Portable Document Format
- Description:
- 19248Article Text5723611020171018.pdf