BibTex RIS Cite
Year 2006, Volume: 6 Issue: 2, 211 - 221, 02.01.2012

Abstract

References

  • Miller, Victor S. "Elliptic Curves and their use in Cryptography" DIMACS Workshop on Unusual Applications of Number Theory, 21 March 1997
  • Win, Erik De and Preneel, "Elliptic Curve Public Key Cryptosystems-an introduction" State of the Art in Applied Cryptography 1997 pp.131-141
  • Stinson, Douglas R. Cryptography: Theory and Practice. CRC Press, 1995, and 2002(second edition).
  • Wade Trappe&Lawrence C. Washington, Introduction to Cryptography with Coding Theory. Prentice-Hall, 2002
  • Juristic, A. and Menezes, A. "Elliptic Curves and Cryptography." Dr. Dobb's Journal, April Johnson, D. and Menezes, A. "The Elliptic Curve Digital Signature Algorithm" Technical Report. CORR 99-34, Dep. Of C&O, University of Waterloo, Canada. Aug.23, 1999 Update: Feb. , 2000
  • Michael Rosing, Implementing Elliptic Curve Cryptography. Manning Publications Co. 1999
  • Dr. Michael J Ganley, Elliptic Curve Cryptography, Thales e-Security Limited, 2001
  • William Stallings, Cryptography and Network Security, Principles and Practice. Prentice-Hall 1999 (Second Edition)
  • M.Aydos, E.Savaş, and Ç.K.Koç, "Implementing network security protocols based on elliptic curve cryptography", Proceedings of the Fourth Symposium on Computer Networks, pp. 130-139, Istanbul, Turkey, May 20-21 1999.
  • There are, however, some problems and issues that are inhibiting the widespread adoption of elliptic curve systems. These include: - the real security of such systems is still not well understood; - difficulty of generating suitable curves; - incompatibility of implementations; - royalties and patents; - relatively slow signature verification[10,11,12]. Çetin Kaya KOÇ, Cryptography: State of the Art and Current Trends, Istanbul, Turkey, SACIS 2003 http://www.certicom.com/resources/ecc_tuto rial/ecc_tutorial.html

A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY

Year 2006, Volume: 6 Issue: 2, 211 - 221, 02.01.2012

Abstract

A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY

References

  • Miller, Victor S. "Elliptic Curves and their use in Cryptography" DIMACS Workshop on Unusual Applications of Number Theory, 21 March 1997
  • Win, Erik De and Preneel, "Elliptic Curve Public Key Cryptosystems-an introduction" State of the Art in Applied Cryptography 1997 pp.131-141
  • Stinson, Douglas R. Cryptography: Theory and Practice. CRC Press, 1995, and 2002(second edition).
  • Wade Trappe&Lawrence C. Washington, Introduction to Cryptography with Coding Theory. Prentice-Hall, 2002
  • Juristic, A. and Menezes, A. "Elliptic Curves and Cryptography." Dr. Dobb's Journal, April Johnson, D. and Menezes, A. "The Elliptic Curve Digital Signature Algorithm" Technical Report. CORR 99-34, Dep. Of C&O, University of Waterloo, Canada. Aug.23, 1999 Update: Feb. , 2000
  • Michael Rosing, Implementing Elliptic Curve Cryptography. Manning Publications Co. 1999
  • Dr. Michael J Ganley, Elliptic Curve Cryptography, Thales e-Security Limited, 2001
  • William Stallings, Cryptography and Network Security, Principles and Practice. Prentice-Hall 1999 (Second Edition)
  • M.Aydos, E.Savaş, and Ç.K.Koç, "Implementing network security protocols based on elliptic curve cryptography", Proceedings of the Fourth Symposium on Computer Networks, pp. 130-139, Istanbul, Turkey, May 20-21 1999.
  • There are, however, some problems and issues that are inhibiting the widespread adoption of elliptic curve systems. These include: - the real security of such systems is still not well understood; - difficulty of generating suitable curves; - incompatibility of implementations; - royalties and patents; - relatively slow signature verification[10,11,12]. Çetin Kaya KOÇ, Cryptography: State of the Art and Current Trends, Istanbul, Turkey, SACIS 2003 http://www.certicom.com/resources/ecc_tuto rial/ecc_tutorial.html
There are 10 citations in total.

Details

Primary Language English
Journal Section Articles
Authors

M.ali Aydın This is me

G.zeynep Aydın

Publication Date January 2, 2012
Published in Issue Year 2006 Volume: 6 Issue: 2

Cite

APA Aydın, M., & Aydın, G. (2012). A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY. IU-Journal of Electrical & Electronics Engineering, 6(2), 211-221.
AMA Aydın M, Aydın G. A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY. IU-Journal of Electrical & Electronics Engineering. January 2012;6(2):211-221.
Chicago Aydın, M.ali, and G.zeynep Aydın. “A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY”. IU-Journal of Electrical & Electronics Engineering 6, no. 2 (January 2012): 211-21.
EndNote Aydın M, Aydın G (January 1, 2012) A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY. IU-Journal of Electrical & Electronics Engineering 6 2 211–221.
IEEE M. Aydın and G. Aydın, “A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY”, IU-Journal of Electrical & Electronics Engineering, vol. 6, no. 2, pp. 211–221, 2012.
ISNAD Aydın, M.ali - Aydın, G.zeynep. “A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY”. IU-Journal of Electrical & Electronics Engineering 6/2 (January 2012), 211-221.
JAMA Aydın M, Aydın G. A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY. IU-Journal of Electrical & Electronics Engineering. 2012;6:211–221.
MLA Aydın, M.ali and G.zeynep Aydın. “A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY”. IU-Journal of Electrical & Electronics Engineering, vol. 6, no. 2, 2012, pp. 211-2.
Vancouver Aydın M, Aydın G. A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY. IU-Journal of Electrical & Electronics Engineering. 2012;6(2):211-2.