Elliptic Curve Cryptography in Practice

@inproceedings{Bos2013EllipticCC,
  title={Elliptic Curve Cryptography in Practice},
  author={Joppe W. Bos and J. Alex Halderman and Nadia Heninger and Jonathan Moore and Michael Naehrig and Eric Wustrow},
  booktitle={IACR Cryptology ePrint Archive},
  year={2013}
}
In this paper we perform a review of elliptic curve cryptography (ECC) as it is used in practice today in order to reveal unique mistakes and vulnerabilities that arise in implementations of ECC. We study four popular protocols that make use of this type of public-key cryptography: Bitcoin, secure shell (SSH), transport layer security (TLS), and the Austrian e-ID card. We are pleased to observe that about 1 in 10 systems support ECC across the TLS and SSH protocols. However, we find that… CONTINUE READING
BETA

Citations

Publications citing this paper.
SHOWING 1-10 OF 92 CITATIONS

Efficient and Secure ECDSA Algorithm and its Applications: A Survey

VIEW 5 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Security Threats Classification in Blockchains

VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Key management in wireless Body Area Network: Challenges and issues

  • J. Network and Computer Applications
  • 2017
VIEW 10 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Financial Cryptography and Data Security

  • Lecture Notes in Computer Science
  • 2016
VIEW 7 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Personal cloud interoperability

  • 2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)
  • 2016
VIEW 5 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

Practical Evaluation of Static Analysis Tools for Cryptography: Benchmarking Method and Case Study

  • 2017 IEEE 28th International Symposium on Software Reliability Engineering (ISSRE)
  • 2017
VIEW 10 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Application of elliptic curve cryptography in pretty good privacy (PGP)

  • 2016 International Conference on Computing, Communication and Automation (ICCCA)
  • 2016
VIEW 5 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2013
2019

CITATION STATISTICS

  • 11 Highly Influenced Citations

  • Averaged 16 Citations per year from 2017 through 2019

References

Publications referenced by this paper.
SHOWING 1-10 OF 44 REFERENCES

Standards for efficient cryptography 1: Elliptic curve cryptography

Certicom Research
  • Standard SEC1, Certicom,
  • 2009
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Bitcoin: A peer-to-peer electronic cash system

S. Nakamoto
  • http://bitcoin.org/bitcoin.pdf,
  • 2009
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

Elliptic Curve Cryptosystems

VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Use of Elliptic Curves in Cryptography

VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Blockchain.info issues refunds to Bitcoin theft victims. http://www.coindesk.com/ blockchain-info-issues-refunds-to-bitcoin-theft-victims

D. Gilson
  • 2013
VIEW 1 EXCERPT

Safecurves: choosing safe curves for elliptic-curve cryptography

D. J. Bernstein, T. Lange
  • http: //safecurves.cr.yp.to, accessed 31 October
  • 2013

Similar Papers

Loading similar papers…