A new approach is used to implement elliptic curve cryptography (ECC) over prime finite fields. The new approach uses Gaussian integers instead of rational integers. It generates a much larger number of points under the same curve equation and the same prime p. The elliptic curve arithmetic is basically the same but works on complex numbers. The security of the proposed method is far higher. When compared to the original prime field, the new method requires double the space to store cryptographic keys represented by points but the security level, in terms of the group order, is roughly squared. Key words
Koblitz and Miller proposed a method by which the group of points on an elliptic curve over a finite...
International audienceOne of the main difficulties for implementing cryptographic schemes based on ...
In this paper we introduce a cryptosystem based on the quotient groups of the group of rational poin...
Elliptic curve cryptography is a cornerstone of embedded security. However, hardware implementations...
Elliptic curve cryptography (ECC) is an approach to public key Cryptography based on the algebraic s...
<p>- Cryptography is the technique of transforming an intelligible message into unintelligible forma...
This work presents a new concept to implement the elliptic curve point multiplication (PM). This com...
Elliptic Curve Cryptography (ECC) represents a different way to do public-key cryptography and it of...
Koblitz ([5]) and Miller ([6]) proposed a method by which the group of points on an elliptic curve o...
The use of finite fields of low characteristic can make the implementation of elliptic curve cryptog...
Abstract. One of the main difficulties for implementing cryptographic schemes based on elliptic curv...
In the security based smart applications, there is the need for authentication to maintain the confi...
Elliptic Curves (EC) are a rich mathematical subject that, in recent years, has found several import...
More than 25 years ago, elliptic curves over finite fields were suggested as a group in which the Di...
The subject of the thesis at hand is the description of an efficient algorithm for finding an ellipt...
Koblitz and Miller proposed a method by which the group of points on an elliptic curve over a finite...
International audienceOne of the main difficulties for implementing cryptographic schemes based on ...
In this paper we introduce a cryptosystem based on the quotient groups of the group of rational poin...
Elliptic curve cryptography is a cornerstone of embedded security. However, hardware implementations...
Elliptic curve cryptography (ECC) is an approach to public key Cryptography based on the algebraic s...
<p>- Cryptography is the technique of transforming an intelligible message into unintelligible forma...
This work presents a new concept to implement the elliptic curve point multiplication (PM). This com...
Elliptic Curve Cryptography (ECC) represents a different way to do public-key cryptography and it of...
Koblitz ([5]) and Miller ([6]) proposed a method by which the group of points on an elliptic curve o...
The use of finite fields of low characteristic can make the implementation of elliptic curve cryptog...
Abstract. One of the main difficulties for implementing cryptographic schemes based on elliptic curv...
In the security based smart applications, there is the need for authentication to maintain the confi...
Elliptic Curves (EC) are a rich mathematical subject that, in recent years, has found several import...
More than 25 years ago, elliptic curves over finite fields were suggested as a group in which the Di...
The subject of the thesis at hand is the description of an efficient algorithm for finding an ellipt...
Koblitz and Miller proposed a method by which the group of points on an elliptic curve over a finite...
International audienceOne of the main difficulties for implementing cryptographic schemes based on ...
In this paper we introduce a cryptosystem based on the quotient groups of the group of rational poin...