Implementation of Elliptic Curve Digital Signature Algorithm

@article{Khalique2010ImplementationOE,
  title={Implementation of Elliptic Curve Digital Signature Algorithm},
  author={Aqeel Khalique and Kuldip Singh and Sandeep Kumar Sood},
  journal={International Journal of Computer Applications},
  year={2010},
  volume={2},
  pages={21-27}
}
The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA). It was accepted in 1999 as an ANSI standard, and was accepted in 2000 as IEEE and NIST standards. It was also accepted in 1998 as an ISO standard, and is under consideration for inclusion in some other ISO standards. Unlike the ordinary discrete logarithm problem and the integer factorization problem, no sub exponential-time algorithm is known for the elliptic curve… Expand
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND IT S VARIANTS
The Elliptic Curve Digital Signature Algorithm (ECDSA) is an elliptic curve variant of the Digital Signature Algorithm (DSA). It gives cryptographically strong digital signatures making use ofExpand
An Efficient Elliptic Curve Digital Signature Algorithm (ECDSA)
In recent years, Elliptic Curve Cryptography (ECC) has attracted the attention of researchers and product developers because of its robust mathematical structure and highest security in comparison toExpand
Performance and Security of ECDSA
TLDR
This paper introduces ECDSA, a version of DSA using elliptic curves, and compares this algorithm to the RSA digital signature algorithm and discusses its various advantages and drawbacks. Expand
Implementation of elliptic curve digital signature algorithm (ECDSA)
TLDR
This paper describes the proposed architecture to implement the ECDSA in FPGAs circuit and results and relevant performance comparisons with related works are presented. Expand
Design of Elliptic Curve Crypto Processor with Modified Karatsuba Multiplier and its Performance Analysis
TLDR
This work presents the design of high performance elliptic curve crypto processor (ECCP) for an elliptic Curve over the finite field GF(2^233) and the curve which is chosen is the standard curve for the digital signature. Expand
Design Of Elliptic Curve Crypto Processor with Modified Karatsuba Multiplier and its Performance Analysis
ECDSA stands for “Elliptic Curve Digital Signature Algorithm”, it’s used to create a digital signature of data (a file for example) in order to allow you to verify its authenticity withoutExpand
Signcryption Using ECDSA and Paillier Cryptosystem
TLDR
A new signcryption scheme is proposed that performs efficient and secure encryption along with signature for verification that is based on both composite residuosity and elliptic curve discrete logarithm problem. Expand
The integer sub-decomposition method to improve the elliptic elgamal digital signature algorithm
  • R. K. Ajeena, S. Yaqoob
  • Mathematics
  • 2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT)
  • 2017
The elliptic ElGamal digital signature algorithm (EEDSA) has been created based on the ElGamal public key cryptosystem (EPKC) and the algorithm of the digital signature (DSA), defined on the ellipticExpand
An Elliptic curve digital signature algorithm (ECDSA) for securing data : an exemplar of securing patient's data
TLDR
The design of the algorithm and its implementation in encryption of medical data is presented and the algorithm is highly secure and can be adapted in many areas where data privacy and security is needed. Expand
Design And Implementation of Low Area/Power Elliptic Curve Digital Signature Hardware Core
TLDR
The security of the proposed ECDSA processor is analyzed against the no correctness check for input points and restart attacks, and different types of RNG will be implemented in order to choose the most appropriate one. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 17 REFERENCES
Elliptic curve DSA (ECSDA): an enhanced DSA
TLDR
This paper compares the draft ANSI X9.62 ECDSA to the ANSIX9.30 DSA, the latter of which is identical to FIPS 186 DSS, and finds the strength-perkey-bit is substantially greater in an algorithm that uses elliptic curves. Expand
Elliptic curve cryptosystems
We discuss analogs based on elliptic curves over finite fields of public key cryptosystems which use the multiplicative group of a finite field. These elliptic curve cryptosystems may be more secure,Expand
Guide to Elliptic Curve Cryptography
TLDR
This guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment, as well as side-channel attacks and countermeasures. Expand
An implementation of an elliptic curve cryptosystem
  • J. Botes, W. T. Penzhorn
  • Mathematics
  • Proceedings of COMSIG '94 - 1994 South African Symposium on Communications and Signal Processing
  • 1994
We discuss the implementation of the analog of the ElGamal (1984) public-key cryptosystem using elliptic curves over finite fields. More specifically, the kind of elliptic curve used is aExpand
Use of Elliptic Curves in Cryptography
  • V. Miller
  • Mathematics, Computer Science
  • CRYPTO
  • 1985
TLDR
An analogue of the Diffie-Hellmann key exchange protocol is proposed which appears to be immune from attacks of the style of Western, Miller, and Adleman. Expand
Speeding up Secure Web Transactions Using Elliptic Curve Cryptography
TLDR
The results show that an Apache web server can handle 11%-31% more HTTPS requests per second when using ECC rather than RSA at short-term security levels, and at security levels necessary to protect data beyond 2010, the use of ECC over RSA improves server performance by 110%-279% under realistic workloads. Expand
Responses to NIST's proposal
TLDR
A review and comment on NIST's proposal for a public key digital signature standard, which is a variant of the E1-Gamal and Schnorr schemes, and is based on reasonably familiar number-theoretic concepts. Expand
Next generation security for wireless: elliptic curve cryptography
Scott Vanstone, from Certicom, polemicizes for elliptic curve cryptography. He advances his company's view that ECC is the next generation of public-key cryptography for wireless.
Available
  • Available
  • 2010
...
1
2
...