UCSY's Research Repository

A Complex Number Approach to Elliptic Curve Cryptosystems over Finite Fields: Implementations and Experiments

Show simple item record

dc.contributor.author Aung, Tun Myat
dc.contributor.author Hla, Ni Ni
dc.date.accessioned 2020-02-14T03:13:45Z
dc.date.available 2020-02-14T03:13:45Z
dc.date.issued 2019-09-02
dc.identifier.citation DOI: 10.1109/ICCCI.2019.8821887 en_US
dc.identifier.isbn 978-1-5386-8259-3
dc.identifier.issn 2329-7190
dc.identifier.uri http://onlineresource.ucsy.edu.mm/handle/123456789/2490
dc.description.abstract Network security is a general idea to ensure information transmission over PC and portable systems. Elliptic curve cryptosystems are nowadays widely used in public communication channels for network security. Their security relies upon the complexity of clarifying the elliptic curve discrete alogarithm issue. But, there are several general attacks in them. Elliptic bend number juggling is actualized over complex fields to enhance the security of elliptic curve cryptosystems. This paper starts with the qualities of elliptic curve cryptosystems and their security administrations. At that point we talk about limited field number-crunching and its properties, prime field numbercrunching, twofold field math and complex number-crunching, and elliptic bend number-crunching over prime field and parallel field. This paper proposes how to execute the unpredictable number of math under prime field and double field utilizing java BigInteger class. also, we actualize elliptic bend math and elliptic bend cryptosystems utilizing complex numbers over prime field and double field and talk about our trials that got from the usage. en_US
dc.language.iso en en_US
dc.publisher IEEE Proceeding of ICCCI 2019 en_US
dc.relation.ispartofseries EC513;pp. 221-228
dc.subject complex number en_US
dc.subject elliptic bend en_US
dc.subject tests en_US
dc.subject execution en_US
dc.subject arrange security en_US
dc.subject prime field en_US
dc.title A Complex Number Approach to Elliptic Curve Cryptosystems over Finite Fields: Implementations and Experiments en_US
dc.type Article en_US

Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Repository


My Account