Secure elliptic curves in cryptography

e-Archivo Repository

Show simple item record Gayoso Martínez, Victor González Manzano, Lorena Martín Muñoz, Agustín 2018-03-15T16:07:34Z 2018-08-01T22:00:06Z
dc.identifier.bibliographicCitation Gonzalez Manzano, Lorena; Gayoso Martínez, Victor; Martin Muñoz, Agustin (2017). Secure elliptic curves in cryptography. In: Computer and network security essentials. Springer. Pp. 283-298
dc.identifier.isbn 978-3-319-58424-9
dc.description.abstract Elliptic Curve Cryptography (ECC) is a branch of public-key cryptography based on the arithmetic of elliptic curves. In the short life of ECC, most standards have proposed curves defined over prime finite fields using the short Weierstrass form. However, some researchers have started to propose as a more secure alternative the use of Edwards and Montgomery elliptic curves, which could have an impact in current ECC deployments. This chapter presents the different types of elliptic curves used in Cryptography together with the best-known procedure for generating secure elliptic curves, Brainpool. The contribution is completed with the examination of the latest proposals regarding secure elliptic curves analyzed by the SafeCurves initiative.
dc.description.sponsorship Acknowledgements: This work has been partly supported by Ministerio de Economía y Competitividad (Spain) under the project TIN2014-55325-C2-1-R (ProCriCiS), and by Comunidad de Madrid (Spain) under the project S2013/ICE-3095-CM (CIBERDINE), cofinanced with the European Union FEDER funds.
dc.format.mimetype application/pdf
dc.language.iso eng
dc.publisher Springer
dc.rights © Springer International Publishing AG 2018
dc.title Secure elliptic curves in cryptography
dc.type bookPart
dc.subject.eciencia Informática
dc.rights.accessRights openAccess
dc.relation.projectID Comunidad de Madrid. S2013/ICE-3095/CIBERDINE
dc.relation.projectID Gobierno de España. TIN2014-55325-C
dc.type.version acceptedVersion
dc.identifier.publicationfirstpage 283
dc.identifier.publicationlastpage 298
dc.identifier.publicationtitle Computer and network security essentials
dc.identifier.uxxi CO/0000008738
 Find Full text

Files in this item

*Click on file's image for preview. (Embargoed files's preview is not supported)

This item appears in the following Collection(s)

Show simple item record