Detail publikace

Anomalous Behaviour of Cryptographic Elliptic Curves over Finite Field

FUJDIAK, R. DZURENDA, P. MLÝNEK, P. MIŠUREC, J. ORGOŇ, M. BEZZATEEV, S.

Originální název

Anomalous Behaviour of Cryptographic Elliptic Curves over Finite Field

Typ

článek v časopise ve Web of Science, Jimp

Jazyk

angličtina

Originální abstrakt

New wireless technologies and approaches enable to connect even the simplest sensors with limited computational power to the global network. The need for efficient and secure solutions is growing with the wider use of these devices. This paper provides a new method for speed optimization of Elliptic Curve Cryptography operations which are frequently used in the light-weight secure communication algorithms. This method is based on the anomalous behaviour of specific elliptic curves. We analyse more than 60 curves of various international standards. Further, our method is less complex, easy to deploy and comparable effective as ordinary, more complex methods. Last but not least, we show the importance of future research in the area of elliptic curve parameterization.

Klíčová slova

Cryptography, Data Security, Elliptic Curves, Information Security.

Autoři

FUJDIAK, R.; DZURENDA, P.; MLÝNEK, P.; MIŠUREC, J.; ORGOŇ, M.; BEZZATEEV, S.

Vydáno

22. 10. 2017

Nakladatel

Kaunas University of Technology

Místo

Kaunas, Litva

ISSN

1392-1215

Periodikum

Elektronika Ir Elektrotechnika

Ročník

23

Číslo

5

Stát

Litevská republika

Strany od

82

Strany do

88

Strany počet

7

URL

Plný text v Digitální knihovně

BibTex

@article{BUT137850,
  author="Radek {Fujdiak} and Petr {Dzurenda} and Petr {Mlýnek} and Jiří {Mišurec} and Miloš {Orgoň} and Sergey {Bezzateev}",
  title="Anomalous Behaviour of Cryptographic Elliptic Curves over Finite Field",
  journal="Elektronika Ir Elektrotechnika",
  year="2017",
  volume="23",
  number="5",
  pages="82--88",
  doi="10.5755/j01.eie.23.5.19248",
  issn="1392-1215",
  url="http://eejournal.ktu.lt/index.php/elt/article/view/19248/9031"
}