2020
DOI: 10.1080/09720502.2020.1731959
|View full text |Cite
|
Sign up to set email alerts
|

Demystifying elliptic curve cryptography: Curve selection, implementation and countermeasures to attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…There are several other proposed solutions to address threats to confidentiality in 5G networks. One approach is to use lightweight encryption methods, such as elliptic curve cryptography [137] or post-quantum cryptographic solutions [16]. Another option is to implement end-to-end (E2E) security using IP security (IPSec) or transport layer security (TLS) encryption [119].…”
Section: A: Confidentiality Threatsmentioning
confidence: 99%
“…There are several other proposed solutions to address threats to confidentiality in 5G networks. One approach is to use lightweight encryption methods, such as elliptic curve cryptography [137] or post-quantum cryptographic solutions [16]. Another option is to implement end-to-end (E2E) security using IP security (IPSec) or transport layer security (TLS) encryption [119].…”
Section: A: Confidentiality Threatsmentioning
confidence: 99%
“…It is important to point out that this paper concentrates on private-key ciphers, yet there are numerous studies that have concentrated on the implementation of public-key algorithms and their ability to withstand attacks from third parties. As evidence of this, there have been studies on effective executions of public-key algorithms such as the elliptic curve and RSA [ 9 , 10 , 11 , 12 ], as well as theoretical attacks [ 13 , 14 , 15 ]. Consequently, this study concentrates on the implementation of a security system on private-key encryption systems, while public-key encryption systems are not included.…”
Section: Introductionmentioning
confidence: 99%
“…It should be noted that there are many works that study public key encryption implementations and analyze their robustness against different attacks. As a brief example for the reader, efficient implementations of public key algorithms (ECC and RSA) are presented in [14][15][16][17], and theoretical attacks are described in [18][19][20]. Due to the great number of encryption systems that exist, as mentioned above, at this point we focus on the analysis of private key ciphers because public key ciphers are out of our scope.…”
Section: Introductionmentioning
confidence: 99%