67
Views
8
CrossRef citations to date
0
Altmetric
Articles

Demystifying elliptic curve cryptography: Curve selection, implementation and countermeasures to attacks

, &

References

  • Zhe Liu , Xinyi Huang , Zhi Hu , Muhammad Khurram Khan , Hwajeong Seo , and Lu Zhou , “On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age”, IEEE Transactions on Dependable and Secure Computing , Vol. 14, No. 3, May/June 2017, pp 237-248.
  • Feng-Hsiag Hsiao ,”Applying elliptic curve cryptography to a chaotic synchronisation system: neural-network-based approach”, International Journal of Systems Science , Volume 48, 2017, Issue 14, pages 3044-3059.
  • Jorge Granjal , Edmundo Monteiro , Jorge Sá Silva , “Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues”, IEEE Communications Surveys & Tutorials , Volume: 17, Issue: 3, third quarter 2015, Page(s): 1294–1312
  • Daniel J. Bernstein and Tanja Lange . SafeCurves: choosing safe curves for elliptic-curve cryptography. https://safecurves.cr.yp.to, accessed 1 December 2014
  • M. Varchola , T. Guneysu , O. Mischke , “MicroECC: A Lightweight Reconfigurable Elliptic Curve Crypto-processor”, In the proceedings of Innternational Conference on Reconfigurable Computing and FP-GAs, 30Nov.-2 December 2011, Cancun, Mexico, Doi: 10.1109/Re-ConFig.2011.61.
  • A. Liu and P. Ning . TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN 2008), pp. 245–256. IEEE Computer Society Press, 2008.
  • Liu Z. , Wenger E. , Großschädl J. (2014) MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks. In: Boureanu I., Owesarski P., Vaudenay S. (2014) Applied Cryptography and Network Security. ACNS 2014. Lecture Notes in Computer Science, vol 8479. Springer, Cham
  • H. Wang and Q. Li . Efficient implementation of public key cryptosystems on mote sensors. In Information and Communications Security — ICICS 2006, vol. 4307 of Lecture Notes in Computer Science, pp. 519–528. Springer Verlag, 2006.
  • D.J. Bernstein , P. Birkner , M. Joye , T. Lange , and C. Peters , “Twisted Edwards curves,” In Progress in. Cryptology. Berlin, Germany, Springer Verlag, 2008, pp. 389-405
  • P.L. Montegomery , “Speeding the Pollard and elliptic curve methods of factorization,” Math. Comput. Vol. 48 no 177, pp 243-264. doi: 10.1090/S0025-5718-1987-0866113-7
  • Bos, J.W. , Costello, C. , Longa, P. et al. Selecting elliptic curves for cryptography: an efficiency and security analysis. J Cryptogr Eng 6, 259– 286 (2016) doi:10.1007/s13389-015-0097-y
  • Lo’ai Tawalbeh , Saadeh Swiedan , “Hardware Design and Implementation of ElGamal Public Key Cryptography Algorithm”, Information Security Journal: A Global Perspective, Volume 19, 2010, Issue 5, pages 243-252. https://doi.org/10.1080/19393555.2010.499799
  • Nissa Mehibel , M’hamed Hamadouche , “A new enhancement of elliptic curve digital signature algorithm”, Journal of Discrete Mathematical Sciences and Cryptography , https://doi.org/10.1080/09720529.2019.1615673
  • Manoj Kumar Chande , Chen Chi Lee , Chun-Ta Li , “Cryptanalysis and improvement of a ECDLP based proxy blind signature scheme”, Journal of Discrete Mathematical Sciences and Cryptography , Volume 21, 2018 - Issue 1, page 23-34. Published online: 16 Mar 2018 doi: 10.1080/09720529.2017.1390845

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.