2012
DOI: 10.1504/ijesdf.2012.045391
|View full text |Cite
|
Sign up to set email alerts
|

Key generation based on elliptic curve over finite prime field

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…The mapping of key to a point on the EC is carried out in the initialization stage which increases the hardware and computational complexity and makes it less suitable for resource constrained applications. A key generation based on EC over finite prime field is published in 2012 [17]. The output is generated by truncating the -coordinate of the point = where is the random value from the LFSR and 's are points on the EC.…”
Section: Related Workmentioning
confidence: 99%
“…The mapping of key to a point on the EC is carried out in the initialization stage which increases the hardware and computational complexity and makes it less suitable for resource constrained applications. A key generation based on EC over finite prime field is published in 2012 [17]. The output is generated by truncating the -coordinate of the point = where is the random value from the LFSR and 's are points on the EC.…”
Section: Related Workmentioning
confidence: 99%
“…The proposed pipelined Vedic multiplier has an optimized area, speed and throughput. The ECC based security systems are performing well against the attacks [37] such as algebraic attack, brute force attack and statistical attack [38,39] and protects confidential data hiding in spatial images [40].…”
Section: Cycle = Time For One Ecpm × Maximum Frequency At/bit = Area-...mentioning
confidence: 99%
“…The pseudo-random sequence used for image encryption must have good randomness properties and high periodicity so that the encrypted image is secure. Recently, several attempts for using ECs in image encryption has been proposed in literature such as [28], [29], [30]. In this section, the pseudo-random sequences generated by the considered 14 schemes are used for encrypting a 256 × 256 grayscale Lena image in which each pixel has a 8-bit value of between 0 and 255 and the security analysis of the ciphered images are carried out.…”
Section: Image Encryption Application Examplementioning
confidence: 99%