Anomalous Behaviour of Cryptographic Elliptic Curves over Finite Field

dc.contributor.authorFujdiak, Radekcs
dc.contributor.authorDzurenda, Petrcs
dc.contributor.authorMlýnek, Petrcs
dc.contributor.authorMišurec, Jiřícs
dc.contributor.authorOrgoň, Milošcs
dc.contributor.authorBezzateev, Sergeycs
dc.coverage.issue5cs
dc.coverage.volume23cs
dc.date.accessioned2021-10-01T06:53:18Z
dc.date.available2021-10-01T06:53:18Z
dc.date.issued2017-10-22cs
dc.description.abstractNew wireless technologies and approaches enable to connect even the simplest sensors with limited computational power to the global network. The need for efficient and secure solutions is growing with the wider use of these devices. This paper provides a new method for speed optimization of Elliptic Curve Cryptography operations which are frequently used in the light-weight secure communication algorithms. This method is based on the anomalous behaviour of specific elliptic curves. We analyse more than 60 curves of various international standards. Further, our method is less complex, easy to deploy and comparable effective as ordinary, more complex methods. Last but not least, we show the importance of future research in the area of elliptic curve parameterization.en
dc.formattextcs
dc.format.extent82-88cs
dc.format.mimetypeapplication/pdfcs
dc.identifier.citationElektronika Ir Elektrotechnika. 2017, vol. 23, issue 5, p. 82-88.en
dc.identifier.doi10.5755/j01.eie.23.5.19248cs
dc.identifier.issn1392-1215cs
dc.identifier.other137850cs
dc.identifier.urihttp://hdl.handle.net/11012/201699
dc.language.isoencs
dc.publisherKaunas University of Technologycs
dc.relation.ispartofElektronika Ir Elektrotechnikacs
dc.relation.urihttp://eejournal.ktu.lt/index.php/elt/article/view/19248/9031cs
dc.rightsCreative Commons Attribution 4.0 Internationalcs
dc.rights.accessopenAccesscs
dc.rights.sherpahttp://www.sherpa.ac.uk/romeo/issn/1392-1215/cs
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/cs
dc.subjectCryptographyen
dc.subjectData Securityen
dc.subjectElliptic Curvesen
dc.subjectInformation Security.en
dc.titleAnomalous Behaviour of Cryptographic Elliptic Curves over Finite Fielden
dc.type.driverarticleen
dc.type.statusPeer-revieweden
dc.type.versionpublishedVersionen
sync.item.dbidVAV-137850en
sync.item.dbtypeVAVen
sync.item.insts2021.10.01 08:53:18en
sync.item.modts2021.10.01 08:14:10en
thesis.grantorVysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií. Ústav telekomunikacícs
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
19248Article Text5723611020171018.pdf
Size:
646.29 KB
Format:
Adobe Portable Document Format
Description:
19248Article Text5723611020171018.pdf