Upload resources

Upload your works to SEDICI to increase its visibility and improve its impact

 

Show simple item record

dc.date.accessioned 2022-05-02T18:26:44Z
dc.date.available 2022-05-02T18:26:44Z
dc.date.issued 2000-06-26
dc.identifier.uri http://sedici.unlp.edu.ar/handle/10915/135456
dc.description.abstract It is widely recognized that public-key cryptography is an important tool for providing security services such as condentiality, data integrity, authentication and non-repudiation, which are requirements present in almost all communications. The main advantage of elliptic curve cryptography (ECC) over competing public-key technologies such as RSA and DSA, is that signicantly smaller parameters can be used in ECC, but with equivalent levels of security. This advantage is especially important for applications on constrained environments such as smart cards, cell phones, personal device assistants, and pagers.From a practical point of view, the implementation of ECC presents various challenges. An ECC-based application requires that several choices be made including the security level, algorithms for implementing the nite eld arithmetic, algorithms for implementing the elliptic group operation, elliptic curve protocols, and the computer platform. These choices may have a signicant impact on the performance of the resulting application.This dissertation focuses on developing ecient algorithms for software implementation of ECC over F 2m. In this framework, we study dierent ways of eciently implementing arithmetic in F 2m, and computing an elliptic scalar multiplication, the central operation of public-key cryptography based on elliptic curves. We also concentrate on the software implementation of these algorithms for diferent platforms including PCs, workstations, and constrained devices such as the RIM interactive pager.This dissertation is a collection of ve papers written in English, with an introduction and conclusions written in Portuguese. en
dc.language en es
dc.subject public-key cryptography es
dc.subject elliptic curve cryptography es
dc.title Implementacão Eficiente em Software de Criptossistemas de Curvas Elípticas pt
dc.type Articulo es
sedici.identifier.uri https://publicaciones.sadio.org.ar/index.php/EJS/article/view/124 es
sedici.identifier.issn 1514-6774 es
sedici.creator.person López Hernández, Julio Cesar es
sedici.subject.materias Ciencias Informáticas es
sedici.description.fulltext true es
mods.originInfo.place Sociedad Argentina de Informática e Investigación Operativa es
sedici.subtype Contribucion a revista es
sedici.rights.license Creative Commons Attribution 4.0 International (CC BY 4.0)
sedici.rights.uri http://creativecommons.org/licenses/by/4.0/
sedici.relation.journalTitle Electronic Journal of SADIO es
sedici.relation.journalVolumeAndIssue vol. 3 es


Download Files

This item appears in the following Collection(s)

Creative Commons Attribution 4.0 International (CC BY 4.0) Except where otherwise noted, this item's license is described as Creative Commons Attribution 4.0 International (CC BY 4.0)