{"created":"2020-09-01T15:05:34.380506+00:00","id":4564,"links":{},"metadata":{"_buckets":{"deposit":"07553d50-f1a7-4a96-8064-2b50a69134b2"},"_deposit":{"id":"4564","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4564"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4564","sets":["1582963302567:1597824227696"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"A Study of General Attacks on Elliptic Curve Discrete Logarithm Problem over Prime Field and Binary Field","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"This paper begins by describing basic properties offinite field and elliptic curve cryptography over prime field andbinary field. Then we discuss the discrete logarithm problem forelliptic curves and its properties. We study the general commonattacks on elliptic curve discrete logarithm problem such as the BabyStep, Giant Step method, Pollard’s rho method and Pohlig-Hellmanmethod, and describe in detail experiments of these attacks overprime field and binary field. The paper finishes by describingexpected running time of the attacks and suggesting strong ellipticcurves that are not susceptible to these attacks."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Discrete logarithm problem"},{"interim":"general attacks"},{"interim":"elliptic curves"},{"interim":"strong curves"},{"interim":"prime field"},{"interim":"binary field"},{"interim":"attack experiments"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2020-02-14"}],"displaytype":"preview","filename":"5. A Study on ECDLP 2017.pdf","filesize":[{"value":"327 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4564/files/5. A Study on ECDLP 2017.pdf"},"version_id":"07ca05c1-eebe-4064-a563-7e04474c60c3"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"International Journal of Information, Control and Computer Sciences","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Aung, Tun Myat"},{"subitem_authors_fullname":"Hla, Ni Ni"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2017-11"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"2517-9942"},"item_title":"A Study of General Attacks on Elliptic Curve Discrete Logarithm Problem over Prime Field and Binary Field","item_type_id":"21","owner":"1","path":["1597824227696"],"publish_date":"2020-02-14","publish_status":"0","recid":"4564","relation_version_is_last":true,"title":["A Study of General Attacks on Elliptic Curve Discrete Logarithm Problem over Prime Field and Binary Field"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T02:13:25.115592+00:00"}