Dissertations / Theses on the topic 'Curve-key'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 28 dissertations / theses for your research on the topic 'Curve-key.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Bommireddipalli, Nithesh Venkata Ramana Surya. "Tutorial on Elliptic Curve Arithmetic and Introduction to Elliptic Curve Cryptography (ECC)." University of Cincinnati / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1511866832906148.
Full textVarga, Ondrej. "Efektivní schémata digitálních podpisů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2011. http://www.nusl.cz/ntk/nusl-219303.
Full textGebremichael, Teklay. "Lightweight Cryptographic Group Key Management Protocols for the Internet of Things." Licentiate thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-35607.
Full textVid tidpunkten för framläggningen av avhandlingen var följande delarbete opublicerat: delarbete 3 (manuskript).
At the time of the defence the following paper was unpublished: paper 3 (manuscript).
SMART (Smarta system och tjänster för ett effektivt och innovativt samhälle)
Hitchcock, Yvonne Roslyn. "Elliptic Curve Cryptography for Lightweight Applications." Queensland University of Technology, 2003. http://eprints.qut.edu.au/15838/.
Full textCarnellosi, Cristiany Fosquiani. "Aporte de sedimentos, nutrientes e microorganismos no Rio Portuguesa." Universidade Estadual do Oeste do Parana, 2007. http://tede.unioeste.br:8080/tede/handle/tede/274.
Full textThe goal of this research was to quantify the amount of liquid, the drop of sediments, nutrients and micro-organisms from Portuguesa river hydrografical basin, Piquiri tributary in Ubiratã/PR. The river basin has an area of 40,819 km2, and from this total 6% is inside the urban area and 94% in the rural area. It was analyzed the physical-chemical parameters, microbiologicals the amount of sediments and quantify of flow. Every datas was about the flow, the use and the soil occupied. The evaluated of water quality from the Portuguesa river trough the analysis of parameters physical-chemical and biologics; the dissolved oxygen, electrical conductivity, pH, water temperature, turbidity, color, total kjeldahl nitrogen, nitrate, nitrite, total phosphorus, total coliforms and thermotolerant coliforms and solids in suspension. There were chosen 3 points at Portuguesa river called P1, P2 and P3 to the realization of the cross-section. The collection was done between a couple of weeks, or with the meaning increase of the amount of liquid. The parameters physical-chemical were analyzed in agreement of metodology described by Standard Methods for the Examination of Water and Wastewater (APHA-AWWA-WEF, 1995) and the bacteriologicals parameters were studied trough the subtract method COLILERT (cellophanes). The results show us the water temperature had a fluctuation, could have being associated with the time and the period of the year when sample was done such as the soil accupation. There were relations between electric conduction and dissolved oxygen. The parameter pH was closed to the neutrality in the whole studied points. The electric conduction, color and turbidity had the relation with flow such as increase or decrease of it. The variable dissolved oxygen showed the degrees less than 5mg.L-1 in all points between 08/03/2007 and 03/04/2007, having a relation to the temperature and flow. In relation of variability from nutrients (total phosphorus, nitrite and nitrate) exception to total kjeldahl nitrogen, that doesn t have relation to the flow, the smaller values found were associated with smaller flow. About the total coliforms, the P1 showed the biggest concentration associated to the increase of flow. Thermotolerant coliforms, P2 and P3 showed the biggest concentration, these points are localized next to the urban area. The key-curve of solid flush in suspension and flow, bring up good correlation among the three monitored points, shows up the worth of flow and sediments obtained are about the flush of basic flow by inecessability to the control stages of rain. About the production of sediments trough the analysis of the solids values in suspension and the bigger flows. To help the future use of water from Portuguesa river, was compared the parameters analyzeds to the stabilished limits from resolution CONAMA 357/2005, to put them in the class and use. Some parameters set the Portuguesa river in class 2 and others in class 3.
O presente trabalho teve como objetivo quantificar a vazão líquida, o aporte de sedimentos, de nutrientes e de microorganismos da bacia hidrográfica do rio Portuguesa, tributário do Piquiri, no município de Ubiratã/PR. A bacia possui uma área de 40,819 km2, sendo que deste total, 6% está inserido na área urbana e 94% na área rural. Foram realizadas análises referentes a parâmetros físico-químicos, microbiológicos, carga de sedimentos quantificação de vazão. Todos os dados foram correlacionados com a vazão e com o uso e ocupação do solo. Avaliou-se a qualidade das águas do rio Portuguesa através da análise de parâmetros físico-químicos e biológicos: oxigênio dissolvido, condutividade elétrica, pH, temperatura da água, turbidez, cor, nitrato, nitrito, nitrogênio total kjeldahl, fósforo total, coliformes totais e termotolerantes e sólidos em suspensão. Foram escolhidos para realização da amostragem, 3 pontos localizados no rio Portuguesa, denominados P1, P2 e P3. As coletas foram realizadas com periodicidade de 15 dias, ou com aumento significativo da vazão. Os parâmetros físico-químicos foram analisados de acordo com as metodologias descritas no Standard Methods for the Examination of Water and Wastewater (APHA-AWWA-WEF, 1995) e os parâmetros bacteriológicos foram analisados através do método substrato COLILERT (Cartelas). Os resultados obtidos demonstraram que a temperatura da água apresentou uma oscilação, podendo estar associado com o horário, a época do ano que foi realizada amostragem e o uso e ocupação do solo. Houve ainda uma relação com a condutividade elétrica e oxigênio dissolvido. O parâmetro pH manteve-se próximo a neutralidade em todos os pontos estudados. Condutividade elétrica, cor e turbidez tiveram relação com a vazão, tanto com o aumento quanto com diminuição da mesma. A variável oxigênio dissolvido apresentou valores abaixo de 5 mg. L-1 em todos os pontos nos dias 08/03/2007 e 03/04/2007, havendo uma relação com temperatura e vazão. Em relação as variáveis nutrientes (fósforo total, nitrito e nitrato) com exceção do nitrogênio total kjeldhal, que não teve relação com a vazão, os menores valores encontradas estiveram associados com baixas vazões. Em relação a coliformes totais, o P1 apresentou maiores concentrações associados ao aumento da vazão. Coliformes termotolerantes, P2 e P3 apresentaram maiores concentrações, estes pontos localizam-se próximos a área urbana. A curva-chave de descarga sólida em suspensão e vazão, apresentou boa correlação nos três pontos monitorados, destaca-se que os valores de vazão e sedimentos obtidos referem-se ao fluxo de vazão básica, pela inacessibilidade às secções de controle durante a chuva. Em relação à produção de sedimentos, através das análises de sólidos em suspensão pode-se observar que P1 apresentou os maiores valores de sólidos em suspensão e maiores vazões. Como auxílio no uso futuro das águas do rio Portuguesa, comparou-se os parâmetros analisados aos limites estabelecidos pela Resolução CONAMA 357/2005, a fim de enquadra-lo na classe de uso. Alguns parâmetros enquadraram o rio Portuguesa em classe 2 e outros em classe 3.
Iost, Caroline. "Produção de sedimentos e qualidade da água de uma microbacia hidrográfica rural." Universidade Estadual do Oeste do Parana, 2008. http://tede.unioeste.br:8080/tede/handle/tede/285.
Full textCoordenação de Aperfeiçoamento de Pessoal de Nível Superior
The objective of this work was to evaluate the influence of land use in the production of sediment and water quality of the micro basin of river Mandarina micro basin, located in the city of Cascavel-PR. The liquid discharge, the suspended sediment and the physic-chemical parameters dissolved oxygen (DO), electrical conductivity, pH, temperature of the water, turbidity, color, nitrate, nitrite, total nitrogen, total phosphorus was monitoring between the months January and August 2007 at the river's main. It was determined the curve-key of the liquid discharge and discharge of suspended solid, which showed good correlation (R2 equal to 0.98 and 0.93, respectively). The results indicated a low production of sediment, average of 0,27 t dia-1 and good water quality, because the parameters have not gone beyond the limits praised by Resolution 345/05 of CONAMA for rivers, Class 2, with the exception of dissolved oxygen in some collections was below 5 mg L-1, color and total phosphorus which also exceeded the limits stipulated. Agriculture is the predominant activity in the micro basin (88%) and water courses have about 79% of the area of riparian forest required by law. It is believed that the soil management in the area of agriculture with practices such as tillage and system of terraces, as well as the presence of riparian forest in rivers, influenced for the good quality water and low production sediment on the water.
O objetivo deste trabalho foi verificar a influência do uso do solo na produção de sedimento e na qualidade da água da microbacia hidrográfica da sanga Mandarina, localizada no município de Cascavel-PR. A vazão, o sedimento em suspensão e os parâmetros físico-químicos da água, oxigênio dissolvido (OD), condutividade elétrica, pH, temperatura da água, turbidez, cor, nitrato, nitrito, nitrogênio total e fósforo total foram monitorados entre os meses de janeiro e agosto de 2007, no principal rio da microbacia. Determinou-se a curva-chave da vazão e da descarga sólida em suspensão, as quais apresentaram boa correlação (R2 igual a 0,98 e 0,93, respectivamente). Os resultados indicaram uma baixa produção, média de 0,27 t dia-1 de sedimento e uma boa qualidade da água, pois os parâmetros não ultrapassaram os limites regidos pela Resolução 345/05 do CONAMA para rios de Classe 2, com exceção do oxigênio dissolvido que em algumas coletas esteve abaixo de 5 mg L-1, cor e fósforo total que também ultrapassaram os limites estipulados. A agricultura é a atividade predominante na microbacia (88%) e os cursos d água apresentam cerca de 79% da área de mata ciliar exigida por lei. Acredita-se que o manejo do solo na área agricultável com práticas como o plantio direto e sistema de terraços, assim como a presença de mata ciliar nos rios influenciaram para o boa qualidade da água e baixa produção de sedimento no curso d água.
Shoaib, Naveed. "A Portable and Improved Implementation of the Diffie-Hellman Protocol for Wireless Sensor Networks." Connect to resource online, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1253597142.
Full textPönisch, Jens. "Kryptoggraphie mit elliptischen Kurven." Universitätsbibliothek Chemnitz, 2014. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-qucosa-156488.
Full textAbu-Mahfouz, Adnan Mohammed. "Elliptic curve cryptosystem over optimal extension fields for computationally constrained devices." Diss., University of Pretoria, 2004. http://hdl.handle.net/2263/25330.
Full textDissertation (MEng (Computer Engineering))--University of Pretoria, 2006.
Electrical, Electronic and Computer Engineering
unrestricted
Perzynová, Kateřina. "Hypereliptické křivky a jejich aplikace v kryptografii." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2010. http://www.nusl.cz/ntk/nusl-229028.
Full textGoya, Denise Hideko. "Criptografia de chave pública sem certificado." Universidade de São Paulo, 2011. http://www.teses.usp.br/teses/disponiveis/45/45134/tde-02082012-191831/.
Full textCertificateless public key cryptography is an alternative model to traditional asymmetric key cryptography, because the public key authentication occurs implicitly during a protocol run, with no need of digital certificates management and distribution. It has the potential to reduce computing costs, and it allows a higher security level than the one in the identity-based model. In this PhD thesis, formal security models for certificateless authenticated key agreement are improved with two independent objectives: (1) to increase the trust level for the partial secret key generating authority on which users rely, and (2) to enable computationally efficient protocols, with significant security properties, such as resistance against attacks from adversaries with full control of the communication channel, and from adversaries who are able to replace users\' public keys by any chosen value. In order to demonstrate that these improvements made are feasible and achieve the objectives, new protocols are proposed in the two-party case. These protocols are proved secure by using reduction techniques for provable security.
Pabbuleti, Krishna Chaitanya. "Performance Optimization of Public Key Cryptography on Embedded Platforms." Thesis, Virginia Tech, 2014. http://hdl.handle.net/10919/48120.
Full textMaster of Science
Araujo, Rafael Will Macedo de. "Autenticação e comunicação segura em dispositivos móveis de poder computacional restrito." Universidade de São Paulo, 2013. http://www.teses.usp.br/teses/disponiveis/45/45134/tde-18122013-014306/.
Full textProtocols for authentication and key establishment are fundamental parts in security implementations for electronic devices communication. In applications involving devices with limited computational power (such as smartphones and tablets) communicating with a server, the choice of efficient protocols that require a simpler infrastructure is essential. In this work we select and implement secure key agreement protocols in ID-based and Certificateless public key cryptography models on ARM processor platforms. We also compare running times, memory and network usage.
El, Moustaine Ethmane. "Authentication issues in low-cost RFID." Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00997688.
Full textFujdiak, Radek. "Analýza a optimalizace datové komunikace pro telemetrické systémy v energetice." Doctoral thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-358408.
Full textChou, Tzu-Tong, and 周子桐. "An Efficient Strong Key-insulation Signcryption Scheme with Random Key-update Based on Elliptic Curve." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/436e7r.
Full text國立中央大學
資訊工程學系
106
Private key plays an important character in public key cryptosystem, if private key was exposed, the confidentiality of previous messages would not be guaranteed. With the progress of technology, almost everyone has his/her own mobile device such as cell phone. Signature or decryption are often performed on a mobile device operation in an environment where the private key is likely to be exposed by stealing the mobile device. It is easier to obtain the private key by stealing mobile device than to break the computational assumption on which the security the system is based. In order to reduce the damage of key exposure, Dodis proposed a new paradigm called key-insulation. In the key-insulation cryptosystem, the private key's life time is divided into discrete time periods, and the private key will be updated by interacting with the "auxiliary device" which is placed in safety. It would only cause damage in time period $i$ if the private key exposed in time period $i$, it would not influence any other time periods. The computational cost and communication overhead in key-insulation signature schemes are higher than traditional signature scheme because of updating private key periodically. Signcryption proposed by Zheng can simultaneously achieve both the function of signature and encryption in a logical step, and with more efficient in computational cost and communication overhead than traditional signature-then-encryption. In this thesis, we modified the exsisting key-insulation signature scheme and proposed a new key-insulation signcryption scheme based on elliptic curve with a cost significantly lower than that required by traditional "key-insulation signature-then-encryption" and remains all the properties in key-insulation cryptosystem.
Huang, Wei-Lun, and 黃韋綸. "Multiple Group Key Distribution Protocols Based on Elliptic Curve Cryptography." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/68950415588453489087.
Full text南台科技大學
資訊管理系
98
The purpose of this study is to develop two multiple group key distribution protocols based on elliptic curve cryptography. They will allow all members in a group to share multiple group keys after executing the proposed protocol. Comparing with the existed schemes, our protocols are more efficient and more suitable for many applications. Besides, the security of the proposed protocols is the same with breaking elliptic curve cryptosystem. When the members join or leave, our protocols can renew group keys efficiently. And we prove that our protocols can protect the secret values of the members, and they can prevent the eavesdropping attack and the known key security.
Ebeid, Nevine Maurice. "Key Randomization Countermeasures to Power Analysis Attacks on Elliptic Curve Cryptosystems." Thesis, 2007. http://hdl.handle.net/10012/2772.
Full textHuang, Kuo-Jung, and 黃國榮. "A Study of Authenticated Key Agreement Schemes Based on Elliptic Curve." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/89687507286322162210.
Full text東海大學
資訊工程與科學系
91
In this thesis, we proposed two authenticated key agreement protocols on Elliptic Curve Cryptography. The basic Diffie-Hellman protocol doesn’t authenticate the communicating entities and is vulnerable to the man-in-the-middle attack. To provide authenticity to key agreement protocols, we respectively use shared-password in our first protocol and certificates to our second protocol. Besides, we applied the elliptic curve cryptography for the generation of keys to improve the efficiency. In the first protocol, the authenticated message is generated with the shared-password and the receiver can verify it with his shared-password to ascertain the sender’s identify. The second protocol is one round tripartite authenticated key agreement protocol on the public key infrastructure. Each entity in the second protocol must send a message including his own signature to demonstrate that he is the owner of the certificate. To avoid an adversary intercepting the signature and resending it to others, signature of the sender includes his ephemeral public key and a short-lived timestamp. Besides, we provide the security analysis about our protocols.
Ling, Jie. "Smart card fault attacks on public key and elliptic curve cryptography." Thesis, 2014. http://hdl.handle.net/1805/5967.
Full textBlömmer, Otto, and Seifert presented a fault attack on elliptic curve scalar multiplication called the Sign Change Attack, which causes a fault that changes the sign of the accumulation point. As the use of a sign bit for an extended integer is highly unlikely, this appears to be a highly selective manipulation of the key stream. In this thesis we describe two plausible fault attacks on a smart card implementation of elliptic curve cryptography. King and Wang designed a new attack called counter fault attack by attacking the scalar multiple of discrete-log cryptosystem. They then successfully generalize this approach to a family of attacks. By implementing King and Wang's scheme on RSA, we successfully attacked RSA keys for a variety of sizes. Further, we generalized the attack model to an attack on any implementation that uses NAF and wNAF key.
Sethi, Vibha. "An elliptic curve cryptography based key agreement protocol for wireless network security /." 2006. http://proquest.umi.com/pqdweb?did=1203588311&sid=3&Fmt=2&clientId=10361&RQT=309&VName=PQD.
Full text"Study on elliptic curve public key cryptosystems with application of pseudorandom number generator." 1998. http://library.cuhk.edu.hk/record=b5889523.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 1998.
Includes bibliographical references (leaves 61-[63]).
Abstract also in Chinese.
Chapter 1 --- Introduction --- p.1
Chapter 1.1 --- Why use cryptography? --- p.1
Chapter 1.2 --- Why is authentication important ? --- p.2
Chapter 1.3 --- What is the relationship between authentication and digital sig- nature? --- p.3
Chapter 1.4 --- Why is random number important? --- p.3
Chapter 2 --- Background --- p.5
Chapter 2.1 --- Cryptography --- p.5
Chapter 2.1.1 --- Symmetric key cryptography --- p.5
Chapter 2.1.2 --- Asymmetric key cryptography --- p.7
Chapter 2.1.3 --- Authentication --- p.8
Chapter 2.2 --- Elliptic curve cryptography --- p.9
Chapter 2.2.1 --- Mathematical background for Elliptic curve cryptography --- p.10
Chapter 2.3 --- Pseudorandom number generator --- p.12
Chapter 2.3.1 --- Linear Congruential Generator --- p.13
Chapter 2.3.2 --- Inversive Congruential Generator --- p.13
Chapter 2.3.3 --- PN-sequence generator --- p.14
Chapter 2.4 --- Digital Signature Scheme --- p.14
Chapter 2.5 --- Babai's lattice vector algorithm --- p.16
Chapter 2.5.1 --- First Algorithm: Rounding Off --- p.17
Chapter 2.5.2 --- Second Algorithm: Nearest Plane --- p.17
Chapter 3 --- Several Digital Signature Schemes --- p.18
Chapter 3.1 --- DSA --- p.19
Chapter 3.2 --- Nyberg-Rueppel Digital Signature --- p.21
Chapter 3.3 --- EC.DSA --- p.23
Chapter 3.4 --- EC-Nyberg-Rueppel Digital Signature Scheme --- p.26
Chapter 4 --- Miscellaneous Digital Signature Schemes and their PRNG --- p.29
Chapter 4.1 --- DSA with LCG --- p.30
Chapter 4.2 --- DSA with PN-sequence --- p.33
Chapter 4.2.1 --- Solution --- p.35
Chapter 4.3 --- DSA with ICG --- p.39
Chapter 4.3.1 --- Solution --- p.40
Chapter 4.4 --- EC_DSA with PN-sequence --- p.43
Chapter 4.4.1 --- Solution --- p.44
Chapter 4.5 --- EC一DSA with LCG --- p.45
Chapter 4.5.1 --- Solution --- p.46
Chapter 4.6 --- EC-DSA with ICG --- p.46
Chapter 4.6.1 --- Solution --- p.47
Chapter 4.7 --- Nyberg-Rueppel Digital Signature with PN-sequence --- p.48
Chapter 4.7.1 --- Solution --- p.49
Chapter 4.8 --- Nyberg-Rueppel Digital Signature with LCG --- p.50
Chapter 4.8.1 --- Solution --- p.50
Chapter 4.9 --- Nyberg-Rueppel Digital Signature with ICG --- p.51
Chapter 4.9.1 --- Solution --- p.52
Chapter 4.10 --- EC- Nyberg-Rueppel Digital Signature with LCG --- p.53
Chapter 4.10.1 --- Solution --- p.54
Chapter 4.11 --- EC- Nyberg-Rueppel Digital Signature with PN-sequence --- p.55
Chapter 4.11.1 --- Solution --- p.56
Chapter 4.12 --- EC-Nyberg-Rueppel Digital Signature with ICG --- p.56
Chapter 4.12.1 --- Solution --- p.57
Chapter 5 --- Conclusion --- p.59
Bibliography --- p.61
Huang, Tsung-Fu, and 黃琮富. "Threshold Key Management and Signature Scheme Based on the Elliptic Curve Cryptosystem for Ad Hoc Networks." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/56013509441475039623.
Full text南台科技大學
資訊管理系
96
This paper proposed two scheme of digital signature and key management for ad hoc networks.One is threshold signature Scheme based on the elliptic curve cryptosystem(ECCTDS),the other is threshold key management Scheme based on the elliptic curve cryptosystem(ECCTKM). In ECCTDS,for reduce computing cost,we selecting the certain amount of server node within the network that distribute the certificate center (CA) to the server group,and make use of lagrange interpolation polynomial with elliptic curve signature algorithm to produce and combine a partial signature.In the combine process of signature, the participant doesn't need to disclosure a private key and node after to receive a sub secret namely don't need certificate center.In ECCTKM,we detailed description the process about key generate,new member join,node sub security key refresh and system private key refresh,otherwise,we also solve security channel problem.
TebbieTung, Iu-Chui, and 董蕘翠. "Finding the secret key in Bitcoin: A review on mathematical approaches to Elliptic Curve Discrete Logarithm Problem." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/bkwnf4.
Full text國立成功大學
數學系應用數學碩博士班
107
With the popular usage of Bitcoin, safety in making payments or transactions becomes a topic of concern. In brief, the security chiefly relies on the easiness of finding the secret key/ private key in Bitcoin. To a large extent, this depends on how easy it is to resolve an Elliptic Curve Discrete Logarithm Problem (ECDLP). With that in mind, the main focus of this paper is to review any mathematical approaches and their variants that can theoretically tackle an ECDLP in Bitcoin. The objective is to discuss the security of Bitcoin by studying methods of uncovering the private key. On the other hand, the existence of non-mathematical approaches provides an alternative to figure out the private key faster. Notably, they work only in the presence of implementation vulnerabilities. Even so, in consideration of the influence that non-mathematical approaches may bring about, this paper also includes an outline of some of the frequently mentioned ones. Last but not least, results indicated that using Bitcoin for payments or transactions appears to be secure at this stage, but the development of quantum computers may alter the situation in the future. By taking this into account, this paper ends up with a comment on the impact of quantum computers on Bitcoin.
Alrefai, Ahmad Salam. "On Efficient Polynomial Multiplication and Its Impact on Curve based Cryptosystems." Thesis, 2013. http://hdl.handle.net/10012/8083.
Full textDas, Saptarsi. "A Polymorphic Finite Field Multiplier." Thesis, 2011. http://hdl.handle.net/2005/2100.
Full textSava��, Erkay. "Implementation aspects of elliptic curve cryptography." Thesis, 2000. http://hdl.handle.net/1957/32515.
Full textGraduation date: 2001
"A microcoded elliptic curve cryptographic processor." 2001. http://library.cuhk.edu.hk/record=b5890724.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 2001.
Includes bibliographical references (leaves [85]-90).
Abstracts in English and Chinese.
Abstract --- p.i
Acknowledgments --- p.iii
List of Figures --- p.ix
List of Tables --- p.xi
Chapter 1 --- Introduction --- p.1
Chapter 1.1 --- Motivation --- p.1
Chapter 1.2 --- Aims --- p.3
Chapter 1.3 --- Contributions --- p.3
Chapter 1.4 --- Thesis Outline --- p.4
Chapter 2 --- Cryptography --- p.6
Chapter 2.1 --- Introduction --- p.6
Chapter 2.2 --- Foundations --- p.6
Chapter 2.3 --- Secret Key Cryptosystems --- p.8
Chapter 2.4 --- Public Key Cryptosystems --- p.9
Chapter 2.4.1 --- One-way Function --- p.10
Chapter 2.4.2 --- Certification Authority --- p.10
Chapter 2.4.3 --- Discrete Logarithm Problem --- p.11
Chapter 2.4.4 --- RSA vs. ECC --- p.12
Chapter 2.4.5 --- Key Exchange Protocol --- p.13
Chapter 2.4.6 --- Digital Signature --- p.14
Chapter 2.5 --- Secret Key vs. Public Key Cryptography --- p.16
Chapter 2.6 --- Summary --- p.18
Chapter 3 --- Mathematical Background --- p.19
Chapter 3.1 --- Introduction --- p.19
Chapter 3.2 --- Groups and Fields --- p.19
Chapter 3.3 --- Finite Fields --- p.21
Chapter 3.4 --- Modular Arithmetic --- p.21
Chapter 3.5 --- Polynomial Basis --- p.21
Chapter 3.6 --- Optimal Normal Basis --- p.22
Chapter 3.6.1 --- Addition --- p.23
Chapter 3.6.2 --- Squaring --- p.24
Chapter 3.6.3 --- Multiplication --- p.24
Chapter 3.6.4 --- Inversion --- p.30
Chapter 3.7 --- Summary --- p.33
Chapter 4 --- Literature Review --- p.34
Chapter 4.1 --- Introduction --- p.34
Chapter 4.2 --- Hardware Elliptic Curve Implementation --- p.34
Chapter 4.2.1 --- Field Processors --- p.34
Chapter 4.2.2 --- Curve Processors --- p.36
Chapter 4.3 --- Software Elliptic Curve Implementation --- p.36
Chapter 4.4 --- Summary --- p.38
Chapter 5 --- Introduction to Elliptic Curves --- p.39
Chapter 5.1 --- Introduction --- p.39
Chapter 5.2 --- Historical Background --- p.39
Chapter 5.3 --- Elliptic Curves over R2 --- p.40
Chapter 5.3.1 --- Curve Addition and Doubling --- p.41
Chapter 5.4 --- Elliptic Curves over Finite Fields --- p.44
Chapter 5.4.1 --- Elliptic Curves over Fp with p>〉3 --- p.44
Chapter 5.4.2 --- Elliptic Curves over F2n --- p.45
Chapter 5.4.3 --- Operations of Elliptic Curves over F2n --- p.46
Chapter 5.4.4 --- Curve Multiplication --- p.49
Chapter 5.5 --- Elliptic Curve Discrete Logarithm Problem --- p.51
Chapter 5.6 --- Public Key Cryptography --- p.52
Chapter 5.7 --- Elliptic Curve Diffie-Hellman Key Exchange --- p.54
Chapter 5.8 --- Summary --- p.55
Chapter 6 --- Design Methodology --- p.56
Chapter 6.1 --- Introduction --- p.56
Chapter 6.2 --- CAD Tools --- p.56
Chapter 6.3 --- Hardware Platform --- p.59
Chapter 6.3.1 --- FPGA --- p.59
Chapter 6.3.2 --- Reconfigurable Hardware Computing --- p.62
Chapter 6.4 --- Elliptic Curve Processor Architecture --- p.63
Chapter 6.4.1 --- Arithmetic Logic Unit (ALU) --- p.64
Chapter 6.4.2 --- Register File --- p.68
Chapter 6.4.3 --- Microcode --- p.69
Chapter 6.5 --- Parameterized Module Generator --- p.72
Chapter 6.6 --- Microcode Toolkit --- p.73
Chapter 6.7 --- Initialization by Bitstream Reconfiguration --- p.74
Chapter 6.8 --- Summary --- p.75
Chapter 7 --- Results --- p.76
Chapter 7.1 --- Introduction --- p.76
Chapter 7.2 --- Elliptic Curve Processor with Serial Multiplier (p = 1) --- p.76
Chapter 7.3 --- Projective verses Affine Coordinates --- p.78
Chapter 7.4 --- Elliptic Curve Processor with Parallel Multiplier (p > 1) --- p.79
Chapter 7.5 --- Summary --- p.80
Chapter 8 --- Conclusion --- p.82
Chapter 8.1 --- Recommendations for Future Research --- p.83
Bibliography --- p.85
Chapter A --- Elliptic Curves in Characteristics 2 and3 --- p.91
Chapter A.1 --- Introduction --- p.91
Chapter A.2 --- Derivations --- p.91
Chapter A.3 --- "Elliptic Curves over Finite Fields of Characteristic ≠ 2,3" --- p.92
Chapter A.4 --- Elliptic Curves over Finite Fields of Characteristic = 2 --- p.94
Chapter B --- Examples of Curve Multiplication --- p.95
Chapter B.1 --- Introduction --- p.95
Chapter B.2 --- Numerical Results --- p.96