Analysis of ECIES and Other Cryptosystems Based on Elliptic Curves

@inproceedings{Martnez2011AnalysisOE,
  title={Analysis of ECIES and Other Cryptosystems Based on Elliptic Curves},
  author={Victor Gayoso Mart{\'i}nez and Fernando Hern{\'a}ndez {\'A}lvarez and Luis Hern{\'a}ndez Encinas and Carmen S{\'a}nchez {\'A}vila},
  year={2011}
}
Elliptic Curve Cryptography (ECC) can be used as a tool for encrypting data, creating digital signatures or performing key exchanges. Regarding the encryption procedure, the schemes currently used are known as hybrid cryptosystems, as they use both symmetric and asymmetric techniques. Among those hybrid cryptosystems based on ECC, the Elliptic Curve Integrated Encryption Scheme (ECIES) is the best known, and as such it can be found in several cryptographic standards. In this work, we present an… CONTINUE READING

Citations

Publications citing this paper.

References

Publications referenced by this paper.
SHOWING 1-10 OF 32 REFERENCES

Elliptic curve public key cryptosystems

  • The Kluwer international series in engineering and computer science
  • 1994
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

A public key cryptosystem and a signature scheme based on discrete logarithms

T. Elgamal
  • CRYPTO 1984
  • 1984
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

Elliptic curve cryptography on smart card

VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

A Proposal for an ISO Standard for Public Key Encryption

  • IACR Cryptology ePrint Archive
  • 2001
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Elliptic curve cryptosystems

VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

A Comparison of the Standardized Versions of ECIES

V. Gayoso Martínez
  • In Proceedings of the 6th International Conference on Information Assurance and Security (IAS
  • 2010
VIEW 1 EXCERPT

PSEC-KEM Specification (v

NTT Corporation
  • 2.2)
  • 2008
VIEW 1 EXCERPT