-
RootNode
-
Co-operative College, Mandalay
-
Cooperative College, Phaunggyi
-
Co-operative University, Sagaing
-
Co-operative University, Thanlyin
-
Dagon University
-
Kyaukse University
-
Laquarware Technological college
-
Mandalay Technological University
-
Mandalay University of Distance Education
-
Mandalay University of Foreign Languages
-
Maubin University
-
Mawlamyine University
-
Meiktila University
-
Mohnyin University
-
Myanmar Institute of Information Technology
-
Myanmar Maritime University
-
National Management Degree College
-
Naypyitaw State Academy
-
Pathein University
-
Sagaing University
-
Sagaing University of Education
-
Taunggyi University
-
Technological University, Hmawbi
-
Technological University (Kyaukse)
-
Technological University Mandalay
-
University of Computer Studies, Mandalay
-
University of Computer Studies Maubin
-
University of Computer Studies, Meikhtila
-
University of Computer Studies Pathein
-
University of Computer Studies, Taungoo
-
University of Computer Studies, Yangon
-
University of Dental Medicine Mandalay
-
University of Dental Medicine, Yangon
-
University of Information Technology
-
University of Mandalay
-
University of Medicine 1
-
University of Medicine 2
-
University of Medicine Mandalay
-
University of Myitkyina
-
University of Public Health, Yangon
-
University of Veterinary Science
-
University of Yangon
-
West Yangon University
-
Yadanabon University
-
Yangon Technological University
-
Yangon University of Distance Education
-
Yangon University of Economics
-
Yangon University of Education
-
Yangon University of Foreign Languages
-
Yezin Agricultural University
-
New Index
-
Item
{"_buckets": {"deposit": "8f965031-8a87-4625-b391-8b868589c868"}, "_deposit": {"id": "4570", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4570"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4570", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "A Complex Number Approach to Elliptic Curve Cryptosystems over Finite Fields: Implementations and Experiments", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Network security is a general idea to ensureinformation transmission over PC and portable systems. Ellipticcurve cryptosystems are nowadays widely used in publiccommunication channels for network security. Their securityrelies upon the complexity of clarifying the elliptic curve discretealogarithm issue. But, there are several general attacks in them.Elliptic bend number juggling is actualized over complex fields toenhance the security of elliptic curve cryptosystems. This paperstarts with the qualities of elliptic curve cryptosystems and theirsecurity administrations. At that point we talk about limited fieldnumber-crunching and its properties, prime field numbercrunching, twofold field math and complex number-crunching,and elliptic bend number-crunching over prime field and parallelfield. This paper proposes how to execute the unpredictablenumber of math under prime field and double field utilizing javaBigInteger class. also, we actualize elliptic bend math and ellipticbend cryptosystems utilizing complex numbers over prime fieldand double field and talk about our trials that got from the usage."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "complex number"}, {"interim": "elliptic bend"}, {"interim": "tests"}, {"interim": "execution"}, {"interim": "arrange security"}, {"interim": "prime field"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2020-02-14"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "12- ICCCI-IEEE Publication- Scopus- paper 2019.pdf", "filesize": [{"value": "172 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 172000.0, "url": {"url": "https://meral.edu.mm/record/4570/files/12- ICCCI-IEEE Publication- Scopus- paper 2019.pdf"}, "version_id": "332c563d-69a9-4855-8f7b-1cdfeb056375"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "IEEE Proceeding of ICCCI 2019", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Aung, Tun Myat"}, {"subitem_authors_fullname": "Hla, Ni Ni"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2019-09-02"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "978-1-5386-8259-3"}, "item_title": "A Complex Number Approach to Elliptic Curve Cryptosystems over Finite Fields: Implementations and Experiments", "item_type_id": "21", "owner": "1", "path": ["1597824227696"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004570", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2020-02-14"}, "publish_date": "2020-02-14", "publish_status": "0", "recid": "4570", "relation": {}, "relation_version_is_last": true, "title": ["A Complex Number Approach to Elliptic Curve Cryptosystems over Finite Fields: Implementations and Experiments"], "weko_shared_id": -1}
A Complex Number Approach to Elliptic Curve Cryptosystems over Finite Fields: Implementations and Experiments
http://hdl.handle.net/20.500.12678/0000004570
http://hdl.handle.net/20.500.12678/00000045702966947f-e136-40d9-b155-37ddee359f85
8f965031-8a87-4625-b391-8b868589c868
Name / File | License | Actions |
---|---|---|
![]() |
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | A Complex Number Approach to Elliptic Curve Cryptosystems over Finite Fields: Implementations and Experiments | |||||
Language | en | |||||
Publication date | 2019-09-02 | |||||
Authors | ||||||
Aung, Tun Myat | ||||||
Hla, Ni Ni | ||||||
Description | ||||||
Network security is a general idea to ensureinformation transmission over PC and portable systems. Ellipticcurve cryptosystems are nowadays widely used in publiccommunication channels for network security. Their securityrelies upon the complexity of clarifying the elliptic curve discretealogarithm issue. But, there are several general attacks in them.Elliptic bend number juggling is actualized over complex fields toenhance the security of elliptic curve cryptosystems. This paperstarts with the qualities of elliptic curve cryptosystems and theirsecurity administrations. At that point we talk about limited fieldnumber-crunching and its properties, prime field numbercrunching, twofold field math and complex number-crunching,and elliptic bend number-crunching over prime field and parallelfield. This paper proposes how to execute the unpredictablenumber of math under prime field and double field utilizing javaBigInteger class. also, we actualize elliptic bend math and ellipticbend cryptosystems utilizing complex numbers over prime fieldand double field and talk about our trials that got from the usage. | ||||||
Keywords | ||||||
complex number, elliptic bend, tests, execution, arrange security, prime field | ||||||
Identifier | 978-1-5386-8259-3 | |||||
Journal articles | ||||||
IEEE Proceeding of ICCCI 2019 | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |