CRYPTOGRAPHY WITH ELLIPTIC CURVES

@inproceedings{Shankar2009CRYPTOGRAPHYWE,
  title={CRYPTOGRAPHY WITH ELLIPTIC CURVES},
  author={T. N. Shankar and Gadadhar Sahoo},
  year={2009}
}
paper describes the basic idea of Elliptic Curve Cryptography(ECC) and its implementation through co-ordinate geometry for data encryption. Elliptic curve cryptography is an asymmetric key cryptography. It includes (i) public key generation on the elliptic curve and its declaration for data encryption and (ii) private key generation and its use in data decryption depended on the points on two dimensional elliptical curve. We also discuss the implementation of ECC on two finite fields, prime… CONTINUE READING

Figures and Tables from this paper.

References

Publications referenced by this paper.
SHOWING 1-10 OF 12 REFERENCES

Weak Fields for ECC

  • IACR Cryptology ePrint Archive
  • 2003
VIEW 1 EXCERPT

A . The state of elliptic curve cryptography

N. Koblitz, J. MenezesA., S. Vanstone
  • Design , Codes , and Cryptography
  • 2000

A . The state of elliptic curve cryptography

N. Koblitz, J. MenezesA., S. Vanstone
  • Design , Codes , and Cryptography
  • 2000

Selecting Cryptographic Key Sizes

  • Public Key Cryptography
  • 2000
VIEW 1 EXCERPT

A method for obtaining digital signatures and public-key cryptosystems

R. Rivest, A. Schamir, Adleman
  • Communications of the ACM,
  • 1978
VIEW 1 EXCERPT

A method for obtaining digital signatures and public-key cryptosystems

R. Rivest, A. Schamir, Adleman
  • Communications of the ACM,
  • 1978
VIEW 1 EXCERPT

Similar Papers