BibTex RIS Cite
Year 2006, Volume: 6 Issue: 2, 211 - 221, 02.01.2012

Abstract

References

  • Miller, Victor S. "Elliptic Curves and their use in Cryptography" DIMACS Workshop on Unusual Applications of Number Theory, 21 March 1997
  • Win, Erik De and Preneel, "Elliptic Curve Public Key Cryptosystems-an introduction" State of the Art in Applied Cryptography 1997 pp.131-141
  • Stinson, Douglas R. Cryptography: Theory and Practice. CRC Press, 1995, and 2002(second edition).
  • Wade Trappe&Lawrence C. Washington, Introduction to Cryptography with Coding Theory. Prentice-Hall, 2002
  • Juristic, A. and Menezes, A. "Elliptic Curves and Cryptography." Dr. Dobb's Journal, April Johnson, D. and Menezes, A. "The Elliptic Curve Digital Signature Algorithm" Technical Report. CORR 99-34, Dep. Of C&O, University of Waterloo, Canada. Aug.23, 1999 Update: Feb. , 2000
  • Michael Rosing, Implementing Elliptic Curve Cryptography. Manning Publications Co. 1999
  • Dr. Michael J Ganley, Elliptic Curve Cryptography, Thales e-Security Limited, 2001
  • William Stallings, Cryptography and Network Security, Principles and Practice. Prentice-Hall 1999 (Second Edition)
  • M.Aydos, E.Savaş, and Ç.K.Koç, "Implementing network security protocols based on elliptic curve cryptography", Proceedings of the Fourth Symposium on Computer Networks, pp. 130-139, Istanbul, Turkey, May 20-21 1999.
  • There are, however, some problems and issues that are inhibiting the widespread adoption of elliptic curve systems. These include: - the real security of such systems is still not well understood; - difficulty of generating suitable curves; - incompatibility of implementations; - royalties and patents; - relatively slow signature verification[10,11,12]. Çetin Kaya KOÇ, Cryptography: State of the Art and Current Trends, Istanbul, Turkey, SACIS 2003 http://www.certicom.com/resources/ecc_tuto rial/ecc_tutorial.html

A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY

Year 2006, Volume: 6 Issue: 2, 211 - 221, 02.01.2012

Abstract

A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY

References

  • Miller, Victor S. "Elliptic Curves and their use in Cryptography" DIMACS Workshop on Unusual Applications of Number Theory, 21 March 1997
  • Win, Erik De and Preneel, "Elliptic Curve Public Key Cryptosystems-an introduction" State of the Art in Applied Cryptography 1997 pp.131-141
  • Stinson, Douglas R. Cryptography: Theory and Practice. CRC Press, 1995, and 2002(second edition).
  • Wade Trappe&Lawrence C. Washington, Introduction to Cryptography with Coding Theory. Prentice-Hall, 2002
  • Juristic, A. and Menezes, A. "Elliptic Curves and Cryptography." Dr. Dobb's Journal, April Johnson, D. and Menezes, A. "The Elliptic Curve Digital Signature Algorithm" Technical Report. CORR 99-34, Dep. Of C&O, University of Waterloo, Canada. Aug.23, 1999 Update: Feb. , 2000
  • Michael Rosing, Implementing Elliptic Curve Cryptography. Manning Publications Co. 1999
  • Dr. Michael J Ganley, Elliptic Curve Cryptography, Thales e-Security Limited, 2001
  • William Stallings, Cryptography and Network Security, Principles and Practice. Prentice-Hall 1999 (Second Edition)
  • M.Aydos, E.Savaş, and Ç.K.Koç, "Implementing network security protocols based on elliptic curve cryptography", Proceedings of the Fourth Symposium on Computer Networks, pp. 130-139, Istanbul, Turkey, May 20-21 1999.
  • There are, however, some problems and issues that are inhibiting the widespread adoption of elliptic curve systems. These include: - the real security of such systems is still not well understood; - difficulty of generating suitable curves; - incompatibility of implementations; - royalties and patents; - relatively slow signature verification[10,11,12]. Çetin Kaya KOÇ, Cryptography: State of the Art and Current Trends, Istanbul, Turkey, SACIS 2003 http://www.certicom.com/resources/ecc_tuto rial/ecc_tutorial.html
There are 10 citations in total.

Details

Primary Language English
Journal Section Articles
Authors

M.ali Aydın

G.zeynep Aydın

Publication Date January 2, 2012
Published in Issue Year 2006 Volume: 6 Issue: 2

Cite

APA Aydın, M., & Aydın, G. (2012). A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY. IU-Journal of Electrical & Electronics Engineering, 6(2), 211-221.
AMA Aydın M, Aydın G. A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY. IU-Journal of Electrical & Electronics Engineering. January 2012;6(2):211-221.
Chicago Aydın, M.ali, and G.zeynep Aydın. “A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY”. IU-Journal of Electrical & Electronics Engineering 6, no. 2 (January 2012): 211-21.
EndNote Aydın M, Aydın G (January 1, 2012) A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY. IU-Journal of Electrical & Electronics Engineering 6 2 211–221.
IEEE M. Aydın and G. Aydın, “A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY”, IU-Journal of Electrical & Electronics Engineering, vol. 6, no. 2, pp. 211–221, 2012.
ISNAD Aydın, M.ali - Aydın, G.zeynep. “A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY”. IU-Journal of Electrical & Electronics Engineering 6/2 (January 2012), 211-221.
JAMA Aydın M, Aydın G. A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY. IU-Journal of Electrical & Electronics Engineering. 2012;6:211–221.
MLA Aydın, M.ali and G.zeynep Aydın. “A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY”. IU-Journal of Electrical & Electronics Engineering, vol. 6, no. 2, 2012, pp. 211-2.
Vancouver Aydın M, Aydın G. A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY. IU-Journal of Electrical & Electronics Engineering. 2012;6(2):211-2.