MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "07553d50-f1a7-4a96-8064-2b50a69134b2"}, "_deposit": {"id": "4564", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4564"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4564", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "A Study of General Attacks on Elliptic Curve Discrete Logarithm Problem over Prime Field and Binary Field", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "This paper begins by describing basic properties offinite field and elliptic curve cryptography over prime field andbinary field. Then we discuss the discrete logarithm problem forelliptic curves and its properties. We study the general commonattacks on elliptic curve discrete logarithm problem such as the BabyStep, Giant Step method, Pollard’s rho method and Pohlig-Hellmanmethod, and describe in detail experiments of these attacks overprime field and binary field. The paper finishes by describingexpected running time of the attacks and suggesting strong ellipticcurves that are not susceptible to these attacks."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Discrete logarithm problem"}, {"interim": "general attacks"}, {"interim": "elliptic curves"}, {"interim": "strong curves"}, {"interim": "prime field"}, {"interim": "binary field"}, {"interim": "attack experiments"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2020-02-14"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "5. A Study on ECDLP 2017.pdf", "filesize": [{"value": "327 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 327000.0, "url": {"url": "https://meral.edu.mm/record/4564/files/5. A Study on ECDLP 2017.pdf"}, "version_id": "07ca05c1-eebe-4064-a563-7e04474c60c3"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "International Journal of Information, Control and Computer Sciences", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Aung, Tun Myat"}, {"subitem_authors_fullname": "Hla, Ni Ni"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2017-11"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "2517-9942"}, "item_title": "A Study of General Attacks on Elliptic Curve Discrete Logarithm Problem over Prime Field and Binary Field", "item_type_id": "21", "owner": "1", "path": ["1597824227696"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004564", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2020-02-14"}, "publish_date": "2020-02-14", "publish_status": "0", "recid": "4564", "relation": {}, "relation_version_is_last": true, "title": ["A Study of General Attacks on Elliptic Curve Discrete Logarithm Problem over Prime Field and Binary Field"], "weko_shared_id": -1}
A Study of General Attacks on Elliptic Curve Discrete Logarithm Problem over Prime Field and Binary Field
http://hdl.handle.net/20.500.12678/0000004564
http://hdl.handle.net/20.500.12678/0000004564f0f8b4c3-41e6-4b5c-9771-d68f815edc4f
07553d50-f1a7-4a96-8064-2b50a69134b2
Name / File | License | Actions |
---|---|---|
5. A Study on ECDLP 2017.pdf (327 Kb)
|
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | A Study of General Attacks on Elliptic Curve Discrete Logarithm Problem over Prime Field and Binary Field | |||||
Language | en | |||||
Publication date | 2017-11 | |||||
Authors | ||||||
Aung, Tun Myat | ||||||
Hla, Ni Ni | ||||||
Description | ||||||
This paper begins by describing basic properties offinite field and elliptic curve cryptography over prime field andbinary field. Then we discuss the discrete logarithm problem forelliptic curves and its properties. We study the general commonattacks on elliptic curve discrete logarithm problem such as the BabyStep, Giant Step method, Pollard’s rho method and Pohlig-Hellmanmethod, and describe in detail experiments of these attacks overprime field and binary field. The paper finishes by describingexpected running time of the attacks and suggesting strong ellipticcurves that are not susceptible to these attacks. | ||||||
Keywords | ||||||
Discrete logarithm problem, general attacks, elliptic curves, strong curves, prime field, binary field, attack experiments | ||||||
Identifier | 2517-9942 | |||||
Journal articles | ||||||
International Journal of Information, Control and Computer Sciences | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |