2016
DOI: 10.1088/1742-6596/710/1/012022
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of Elliptic Curve Cryptography in Binary Field

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 2 publications
0
6
0
1
Order By: Relevance
“…In previous papers we have presented implementations of elliptic curves in Weierstrass form in a binary field: the implementation of a binary field arithmetic operation algorithm [3,4] and the implementation of the simplified Elliptic Curve Integrated Encryption Scheme (S-ECIES) in a binary field [5]. In the current paper, we present the implementation of Curve25519 in S-ECIES, thus showing that Curve25519 can also serve other purposes than key exchange.…”
Section: Introductionmentioning
confidence: 89%
“…In previous papers we have presented implementations of elliptic curves in Weierstrass form in a binary field: the implementation of a binary field arithmetic operation algorithm [3,4] and the implementation of the simplified Elliptic Curve Integrated Encryption Scheme (S-ECIES) in a binary field [5]. In the current paper, we present the implementation of Curve25519 in S-ECIES, thus showing that Curve25519 can also serve other purposes than key exchange.…”
Section: Introductionmentioning
confidence: 89%
“…Let the values of a and b be 1 & also let p be 11 for the curve F p Putting this values in equation 1, we get y 2 = x 3 +x +1 (mod 11) The set of solutions are E= {(1,10), (1,1), (3,5), (3,6), (4,2), (4,9), ( Let point P be (6,6), then the doubling operation is. = (3 * 6 2 +1)/ (2 * 6) mod 11 = (108/12) mod 11 = 9…”
Section: Proposed Methodologymentioning
confidence: 99%
“…The encryption of text by Elliptic Curve Integrated Encryption Scheme was proposed by D R Susantio et al [6]. For the various IoT applications, Elliptic Curve Cryptography provides better security.…”
Section: Correlated Workmentioning
confidence: 99%
“…ECC is used to provide a key exchange, encryption and digital signature, based on the difficulty of an underlying mathematical problem such as the discrete logarithm problem (DLP) in a group defined by points on an elliptic curve over a finite field [11]. ECC remains the strongest public-key cryptosystem known with an addition rule enabling encryption and decryption [1,51]. It uses a small key size, and it is a replacement to Rivest, Shamir, Adleman (RSA) protocols [3] The elliptic curve cryptography is performed over two finite fields: (1) Prime field (F p ) and (2) Binary field F(2 m ) .…”
Section: Why Ecc Over Binary Field?mentioning
confidence: 99%