UCSY's Research Repository

Attack Experiments on Elliptic Curves of Prime and Binary Fields

Show simple item record

dc.contributor.author Hla, Ni Ni
dc.contributor.author Aung, Tun Myat
dc.date.accessioned 2020-02-14T02:50:50Z
dc.date.available 2020-02-14T02:50:50Z
dc.date.issued 2018-12-12
dc.identifier.citation DOI: 10.1007/978-981-13-1951-8_60 en_US
dc.identifier.isbn 978-981-13-1950-1
dc.identifier.issn 2194-5357
dc.identifier.uri http://onlineresource.ucsy.edu.mm/handle/123456789/2487
dc.description.abstract At the beginning the paper describes the basic properties of finite field arithmetic and elliptic curve arithmetic over prime and binary fields. Then it discusses the elliptic curve discrete logarithm problem and its properties. We study the BabyStep, Giant-Step method, Pollard’s rho method and Pohlig–Hellman method, known as general methods that can exploit the elliptic curve discrete logarithm problem, and describe in detail attack experiments using these methods over prime and binary fields. Finally, the paper discusses the expected running time of these attacks and suggests the strong elliptic curves that are not vulnerable to these attacks. en_US
dc.language.iso en en_US
dc.publisher Advances in Intelligent Systems and Computing (IEMIS 2018 Vol. 1) en_US
dc.relation.ispartofseries Springer AISC;Vol. 755, No. 1, pp. 667-683
dc.title Attack Experiments on Elliptic Curves of Prime and Binary Fields en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Repository



Browse

My Account

Statistics