# Implementation of Elliptic Curve Digital Signature Algorithm

@article{Khalique2010ImplementationOE, title={Implementation of Elliptic Curve Digital Signature Algorithm}, author={Aqeel Khalique and Kuldip Singh and Sandeep Kumar Sood}, journal={International Journal of Computer Applications}, year={2010}, volume={2}, pages={21-27} }

The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA). It was accepted in 1999 as an ANSI standard, and was accepted in 2000 as IEEE and NIST standards. It was also accepted in 1998 as an ISO standard, and is under consideration for inclusion in some other ISO standards. Unlike the ordinary discrete logarithm problem and the integer factorization problem, no sub exponential-time algorithm is known for the elliptic curve…

## Figures, Tables, and Topics from this paper

## 96 Citations

A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND IT S VARIANTS

- MathematicsCSE 2014
- 2014

The Elliptic Curve Digital Signature Algorithm (ECDSA) is an elliptic curve variant of the Digital Signature Algorithm (DSA). It gives cryptographically strong digital signatures making use of…

An Efficient Elliptic Curve Digital Signature Algorithm (ECDSA)

- Mathematics2013 International Conference on Machine Intelligence and Research Advancement
- 2013

In recent years, Elliptic Curve Cryptography (ECC) has attracted the attention of researchers and product developers because of its robust mathematical structure and highest security in comparison to…

Performance and Security of ECDSA

- Computer Science
- 2015

This paper introduces ECDSA, a version of DSA using elliptic curves, and compares this algorithm to the RSA digital signature algorithm and discusses its various advantages and drawbacks.

Implementation of elliptic curve digital signature algorithm (ECDSA)

- Computer Science2014 Global Summit on Computer & Information Technology (GSCIT)
- 2014

This paper describes the proposed architecture to implement the ECDSA in FPGAs circuit and results and relevant performance comparisons with related works are presented.

Design of Elliptic Curve Crypto Processor with Modified Karatsuba Multiplier and its Performance Analysis

- Computer Science
- 2013

This work presents the design of high performance elliptic curve crypto processor (ECCP) for an elliptic Curve over the finite field GF(2^233) and the curve which is chosen is the standard curve for the digital signature.

Design Of Elliptic Curve Crypto Processor with Modified Karatsuba Multiplier and its Performance Analysis

- Mathematics
- 2013

ECDSA stands for “Elliptic Curve Digital Signature Algorithm”, it’s used to create a digital signature of data (a file for example) in order to allow you to verify its authenticity without…

Signcryption Using ECDSA and Paillier Cryptosystem

- Computer ScienceICICCT 2019 – System Reliability, Quality Control, Safety, Maintenance and Management
- 2019

A new signcryption scheme is proposed that performs efficient and secure encryption along with signature for verification that is based on both composite residuosity and elliptic curve discrete logarithm problem.

The integer sub-decomposition method to improve the elliptic elgamal digital signature algorithm

- Mathematics2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT)
- 2017

The elliptic ElGamal digital signature algorithm (EEDSA) has been created based on the ElGamal public key cryptosystem (EPKC) and the algorithm of the digital signature (DSA), defined on the elliptic…

An Elliptic curve digital signature algorithm (ECDSA) for securing data : an exemplar of securing patient's data

- Computer Science
- 2017

The design of the algorithm and its implementation in encryption of medical data is presented and the algorithm is highly secure and can be adapted in many areas where data privacy and security is needed.

Design And Implementation of Low Area/Power Elliptic Curve Digital Signature Hardware Core

- Computer Science
- 2017

The security of the proposed ECDSA processor is analyzed against the no correctness check for input points and restart attacks, and different types of RNG will be implemented in order to choose the most appropriate one.

## References

SHOWING 1-10 OF 17 REFERENCES

Elliptic curve DSA (ECSDA): an enhanced DSA

- Computer Science
- 1998

This paper compares the draft ANSI X9.62 ECDSA to the ANSIX9.30 DSA, the latter of which is identical to FIPS 186 DSS, and finds the strength-perkey-bit is substantially greater in an algorithm that uses elliptic curves.

Elliptic curve cryptosystems

- Mathematics
- 1987

We discuss analogs based on elliptic curves over finite fields of public key cryptosystems which use the multiplicative group of a finite field. These elliptic curve cryptosystems may be more secure,…

Guide to Elliptic Curve Cryptography

- Computer ScienceSpringer Professional Computing
- 2004

This guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment, as well as side-channel attacks and countermeasures.

An implementation of an elliptic curve cryptosystem

- MathematicsProceedings of COMSIG '94 - 1994 South African Symposium on Communications and Signal Processing
- 1994

We discuss the implementation of the analog of the ElGamal (1984) public-key cryptosystem using elliptic curves over finite fields. More specifically, the kind of elliptic curve used is a…

Use of Elliptic Curves in Cryptography

- Mathematics, Computer ScienceCRYPTO
- 1985

An analogue of the Diffie-Hellmann key exchange protocol is proposed which appears to be immune from attacks of the style of Western, Miller, and Adleman.

Speeding up Secure Web Transactions Using Elliptic Curve Cryptography

- Computer ScienceNDSS
- 2004

The results show that an Apache web server can handle 11%-31% more HTTPS requests per second when using ECC rather than RSA at short-term security levels, and at security levels necessary to protect data beyond 2010, the use of ECC over RSA improves server performance by 110%-279% under realistic workloads.

Responses to NIST's proposal

- Computer ScienceCACM
- 1992

A review and comment on NIST's proposal for a public key digital signature standard, which is a variant of the E1-Gamal and Schnorr schemes, and is based on reasonably familiar number-theoretic concepts.

Next generation security for wireless: elliptic curve cryptography

- Computer ScienceComput. Secur.
- 2003

Available

- Available
- 2010