Implementacão Eficiente em Software de Criptossistemas de Curvas Elípticas

It is widely recognized that public-key cryptography is an important tool for providing security services such as condentiality, data integrity, authentication and non-repudiation, which are requirements present in almost all communications. The main advantage of elliptic curve cryptography (ECC) ov...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autor principal: López Hernández, Julio Cesar
Formato: Articulo Contribucion a revista
Lenguaje:Inglés
Publicado: 2000
Materias:
Acceso en línea:http://sedici.unlp.edu.ar/handle/10915/135456
https://publicaciones.sadio.org.ar/index.php/EJS/article/view/124
Aporte de:
id I19-R120-10915-135456
record_format dspace
institution Universidad Nacional de La Plata
institution_str I-19
repository_str R-120
collection SEDICI (UNLP)
language Inglés
topic Ciencias Informáticas
public-key cryptography
elliptic curve cryptography
spellingShingle Ciencias Informáticas
public-key cryptography
elliptic curve cryptography
López Hernández, Julio Cesar
Implementacão Eficiente em Software de Criptossistemas de Curvas Elípticas
topic_facet Ciencias Informáticas
public-key cryptography
elliptic curve cryptography
description It is widely recognized that public-key cryptography is an important tool for providing security services such as condentiality, data integrity, authentication and non-repudiation, which are requirements present in almost all communications. The main advantage of elliptic curve cryptography (ECC) over competing public-key technologies such as RSA and DSA, is that signicantly smaller parameters can be used in ECC, but with equivalent levels of security. This advantage is especially important for applications on constrained environments such as smart cards, cell phones, personal device assistants, and pagers.From a practical point of view, the implementation of ECC presents various challenges. An ECC-based application requires that several choices be made including the security level, algorithms for implementing the nite eld arithmetic, algorithms for implementing the elliptic group operation, elliptic curve protocols, and the computer platform. These choices may have a signicant impact on the performance of the resulting application.This dissertation focuses on developing ecient algorithms for software implementation of ECC over F 2m. In this framework, we study dierent ways of eciently implementing arithmetic in F 2m, and computing an elliptic scalar multiplication, the central operation of public-key cryptography based on elliptic curves. We also concentrate on the software implementation of these algorithms for diferent platforms including PCs, workstations, and constrained devices such as the RIM interactive pager.This dissertation is a collection of ve papers written in English, with an introduction and conclusions written in Portuguese.
format Articulo
Contribucion a revista
author López Hernández, Julio Cesar
author_facet López Hernández, Julio Cesar
author_sort López Hernández, Julio Cesar
title Implementacão Eficiente em Software de Criptossistemas de Curvas Elípticas
title_short Implementacão Eficiente em Software de Criptossistemas de Curvas Elípticas
title_full Implementacão Eficiente em Software de Criptossistemas de Curvas Elípticas
title_fullStr Implementacão Eficiente em Software de Criptossistemas de Curvas Elípticas
title_full_unstemmed Implementacão Eficiente em Software de Criptossistemas de Curvas Elípticas
title_sort implementacão eficiente em software de criptossistemas de curvas elípticas
publishDate 2000
url http://sedici.unlp.edu.ar/handle/10915/135456
https://publicaciones.sadio.org.ar/index.php/EJS/article/view/124
work_keys_str_mv AT lopezhernandezjuliocesar implementacaoeficienteemsoftwaredecriptossistemasdecurvaselipticas
bdutipo_str Repositorios
_version_ 1764820455388086272