DocumentCode :
2771572
Title :
Elliptic curve cryptography on constraint environments
Author :
De Santos, María Miguel ; Sanchez-Avila, C. ; Sanchez-Reillo, R.
Author_Institution :
E.T.S.I. Telecomunicacion, Univ. Politecnica de Madrid, Spain
fYear :
2004
fDate :
11-14 Oct. 2004
Firstpage :
212
Lastpage :
220
Abstract :
The main target of this work is to expose the capacities that make elliptic curve cryptography the most suitable one to be implemented in environments with several constraints related to processor speed, bandwidth, security and memory. We have analyzed several elliptic curve cryptosystems with other public key ones. We have made a comparison among different public key cryptosystems (such as ElGamal for encryption and Diffie-Hellman for key exchanging) and the corresponding ones based on elliptic curve theory; highlighting algorithm speed characteristics.
Keywords :
public key cryptography; Diffie-Hellman; ElGamal; constraint environments; elliptic curve cryptography; elliptic curve theory; encryption; key exchange; public key cryptosystems; Bandwidth; Elliptic curve cryptography; Elliptic curves; Galois fields; Public key; Public key cryptography; Safety; Security; Telecommunications; Testing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security Technology, 2004. 38th Annual 2004 International Carnahan Conference on
Print_ISBN :
0-7803-8506-3
Type :
conf
DOI :
10.1109/CCST.2004.1405395
Filename :
1405395
Link To Document :
بازگشت