2018
DOI: 10.1007/978-3-319-76620-1_2
|View full text |Cite
|
Sign up to set email alerts
|

Generation and Implementation of Cryptographically Strong Elliptic Curves

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…RSA) or discrete logarithm (e.g. DH, MQV, DSA, ECDH, ECMQV, ECDSA) [6], in the model of attack using a quantum computer, they no longer provide security [1]. This is due to the fact that there are algorithms that can be performed on a quantum computer, which significantly reduce the computational complexity of cryptosystems based on these problems.…”
Section: Security Degradation Of Session Key Agreement Protocols Basementioning
confidence: 99%
“…RSA) or discrete logarithm (e.g. DH, MQV, DSA, ECDH, ECMQV, ECDSA) [6], in the model of attack using a quantum computer, they no longer provide security [1]. This is due to the fact that there are algorithms that can be performed on a quantum computer, which significantly reduce the computational complexity of cryptosystems based on these problems.…”
Section: Security Degradation Of Session Key Agreement Protocols Basementioning
confidence: 99%
“…RSA) or discrete logarithm (e.g. DH, MQV, DSA, ECDH, ECMQV, ECDSA) [11], in the model of attack using a quantum computer, they no longer provide security [12]. This is due to the fact that there are algorithms that can be performed on a quantum computer, which significantly reduce the computational complexity of cryptosystems based on these problems.…”
Section: A Security Degradation Of Key Agreement Protocolsmentioning
confidence: 99%
“…The elliptic curves with prime order have advantage over nonprime case since each non-neutral element of the curve is a generator of the group of points on the curve. The arithmetic on elliptic curves is presented in papers [5], [12] and over the field F 2 521 −1 in [13]. We check the class number criterion and the twist security for our examples of curves.…”
Section: Introductionmentioning
confidence: 99%