113
Views
11
CrossRef citations to date
0
Altmetric
Articles

A new enhancement of elliptic curve digital signature algorithm

&
Pages 743-757 | Received 01 Jun 2018, Published online: 05 Jul 2019

References

  • Poulakis, D. ‘Some lattice attacks on DSA and ECDSA’, Applicable Algebra in Engineeing, Communication and Computing, vo1. 22, pp. 347-358 .
  • EIGamal, T. ‘A public key cryptosystem and a signature scheme based on discrete logarithm’, IEEE Trans. Inf. Theory, Vol.31, pp. 469-472 (1985). doi: 10.1109/TIT.1985.1057074
  • Kumar, K. A., Krishna, A. V. and Chatrapati, K. S. ‘New secure routing protocol with elliptic curve cryptography for military heterogeneous wireless sensor networks’. Journal of Information and Optimization Sciences, Vol. 38, No. 2, pp. 341-365 (2017). doi: 10.1080/02522667.2016.1220092
  • Rivest, R.L., Hellman, M.E., Anderson, J.C. and Lyons, J.W., Response to NIST’s proposal. Communication of ACM, Vol. 35, No. 7, pp.50–52 (1992). doi: 10.1145/129902.129905
  • Ajeena, R.K.K. and Yaqoob, S. J. ‘The integer sub-decomposition method to improve the elliptic elgamal digital signature algorithm’, 2017 International Conference on Current Research in Computer Science and Information Technology, Slemani, Iraq.IEEE , pp. 14-20 (2017).
  • Durumeric, Z., Kasten, J., Bailey, M. and Halderman, J.A. ‘Analysis of the HTTPS certificate ecosystem’, in Conference on Internet Measurement Conference (IMC), pp.291–304 (2013).
  • Sullivan, N. ‘ECDSA: the digital signature algorithm of a better internet’ [online] https://blog.cloudflare.com/ecdsa-the-digital-signature-algorithm-of-a-better-internet (accessed 10 March 2014) (2014).
  • Fildes, J. ‘iphone hacker publishes secret sonyplaystation 3 key’, BBC New Technology [online] http://www.bbc.com/news/technology-12116051 (accessed 6 January 2011) (2011).
  • Wang, D. ‘Secure Implementation of ECDSA Signatures in Bitcoin’, Information Security at University College of London (2014).
  • Liao, H.Z. and Shen, Y. Y. ‘On the elliptic curve digital signature algorithm’ Tunghai Science, 8, pp.109-126 (2006).
  • Junru, H. ‘The improved elliptic curve digital signature algorithm’, In Electronic and Mechanical Engineering and Information Technology, Harbin, China, 12-14 August, pp. 257-259 (2011).
  • Pornin, T. ‘Deterministic usage of the digital signature algorithm (DSA) and elliptic curve digital signature algorithm (ECDSA) ‘ (2013).
  • Chande, M.K and Lee, C. C. ‘An improvement of a elliptic curve digital signature algorithm’, International Journal of Internet Technology and Secured Transactions, Vol. 6, No.3 pp. 219–230 (2016). doi: 10.1504/IJITST.2016.080406
  • Mehibel, N. and Hamadouche, M. ‘A New Approach of Elliptic Curve Diffie-Hellman Key Exchange’, The 5th International Conference on Electrical Engineering.IEEE, Boumerdes, Algeria, 29-31 October (2017).
  • Mehibel, N. and Hamadouche, M. A public key data encryption based on elliptic curves’ International Journal of Mathematical and Computational Methods, Vol. 2, pp. 393-401 (2017).
  • Chen, B., Wu, W., & Zhang, Y. ‘The Design and Implementation of Digital Signature System Based on Elliptic Curve’, In Proceedings of the 2012 International Conference on Cybernetics and Informatics. Springer, New York, NY, pp. 2041-2047 (2014).
  • De Dormale, Guerric Meurice, and Jean-Jacques Quisquater. “Highspeed hardware implementations of elliptic curve cryptography: A survey.” Journal of systems architecture 53. 2-3 (2007): 72-84.
  • Bunder, M., Nitaj A., Susilo W. and Tonien, J. ‘Cryptanalysis of RSA-type cryptosystems based on Lucas sequences, Gaussian integers and elliptic curves’, Journal of Information Security and Applications, Vol 40, pp. 193–198 (2018). doi: 10.1016/j.jisa.2018.04.006
  • Miller, V. S. ‘Uses of elliptic curves in cryptography’, In Advances in Cryptology, CRYPTO, Proceedings, Lecture Notes in Computer Science, Vol. 218, pp.417-428 (1986). doi: 10.1007/3-540-39799-X_31
  • Koblitz, N. ‘Elliptic curve cryptosystems’, Mathematics of Computation, Vol. 48, No.177, pp.203-209 (1987). doi: 10.1090/S0025-5718-1987-0866109-5
  • Islam, SK Hafizul, and G. P. Biswas. “Design of improved password authentication and update scheme based on elliptic curve cryptography.” Mathematical and Computer Modelling 57.11-12 (2013): 2703–2717.
  • Haichour, A.S., Hamadouche, M. and Khouas, A. ‘Hardware Design and Implementation of ElGamal Elliptic Curve Cryptosystem’, Wulfenia Journal, Vol 23, No.2, pp. 62-85 (2016).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.