Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking


Index Link

Index Tree

  • RootNode
    • Co-operative College, Mandalay
    • Cooperative College, Phaunggyi
    • Co-operative University, Sagaing
    • Co-operative University, Thanlyin
    • Dagon University
    • Kyaukse University
    • Laquarware Technological college
    • Mandalay Technological University
    • Mandalay University of Distance Education
    • Mandalay University of Foreign Languages
    • Maubin University
    • Mawlamyine University
    • Meiktila University
    • Mohnyin University
    • Myanmar Institute of Information Technology
    • Myanmar Maritime University
    • National Management Degree College
    • Naypyitaw State Academy
    • Pathein University
    • Sagaing University
    • Sagaing University of Education
    • Taunggyi University
    • Technological University, Hmawbi
    • Technological University (Kyaukse)
    • Technological University Mandalay
    • University of Computer Studies, Mandalay
    • University of Computer Studies Maubin
    • University of Computer Studies, Meikhtila
    • University of Computer Studies Pathein
    • University of Computer Studies, Taungoo
    • University of Computer Studies, Yangon
    • University of Dental Medicine Mandalay
    • University of Dental Medicine, Yangon
    • University of Information Technology
    • University of Mandalay
    • University of Medicine 1
    • University of Medicine 2
    • University of Medicine Mandalay
    • University of Myitkyina
    • University of Public Health, Yangon
    • University of Veterinary Science
    • University of Yangon
    • West Yangon University
    • Yadanabon University
    • Yangon Technological University
    • Yangon University of Distance Education
    • Yangon University of Economics
    • Yangon University of Education
    • Yangon University of Foreign Languages
    • Yezin Agricultural University
    • New Index

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "8f965031-8a87-4625-b391-8b868589c868"}, "_deposit": {"id": "4570", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4570"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4570", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "A Complex Number Approach to Elliptic Curve Cryptosystems over Finite Fields:  Implementations and Experiments", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Network security is a general idea to ensureinformation transmission over PC and portable systems. Ellipticcurve cryptosystems are nowadays widely used in publiccommunication channels for network security. Their securityrelies upon the complexity of clarifying the elliptic curve discretealogarithm issue. But, there are several general attacks in them.Elliptic bend number juggling is actualized over complex fields toenhance the security of elliptic curve cryptosystems. This paperstarts with the qualities of elliptic curve cryptosystems and theirsecurity administrations. At that point we talk about limited fieldnumber-crunching and its properties, prime field numbercrunching, twofold field math and complex number-crunching,and elliptic bend number-crunching over prime field and parallelfield. This paper proposes how to execute the unpredictablenumber of math under prime field and double field utilizing javaBigInteger class. also, we actualize elliptic bend math and ellipticbend cryptosystems utilizing complex numbers over prime fieldand double field and talk about our trials that got from the usage."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "complex number"}, {"interim": "elliptic bend"}, {"interim": "tests"}, {"interim": "execution"}, {"interim": "arrange security"}, {"interim": "prime field"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2020-02-14"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "12- ICCCI-IEEE Publication- Scopus- paper 2019.pdf", "filesize": [{"value": "172 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 172000.0, "url": {"url": "https://meral.edu.mm/record/4570/files/12- ICCCI-IEEE Publication- Scopus- paper 2019.pdf"}, "version_id": "332c563d-69a9-4855-8f7b-1cdfeb056375"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "IEEE Proceeding of ICCCI 2019", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Aung, Tun Myat"}, {"subitem_authors_fullname": "Hla, Ni Ni"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2019-09-02"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "978-1-5386-8259-3"}, "item_title": "A Complex Number Approach to Elliptic Curve Cryptosystems over Finite Fields:  Implementations and Experiments", "item_type_id": "21", "owner": "1", "path": ["1597824227696"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004570", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2020-02-14"}, "publish_date": "2020-02-14", "publish_status": "0", "recid": "4570", "relation": {}, "relation_version_is_last": true, "title": ["A Complex Number Approach to Elliptic Curve Cryptosystems over Finite Fields:  Implementations and Experiments"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Faculty of Computing

A Complex Number Approach to Elliptic Curve Cryptosystems over Finite Fields: Implementations and Experiments

http://hdl.handle.net/20.500.12678/0000004570
http://hdl.handle.net/20.500.12678/0000004570
2966947f-e136-40d9-b155-37ddee359f85
8f965031-8a87-4625-b391-8b868589c868
None
Preview
Name / File License Actions
12- 12- ICCCI-IEEE Publication- Scopus- paper 2019.pdf (172 Kb)
Publication type
Article
Upload type
Publication
Title
Title A Complex Number Approach to Elliptic Curve Cryptosystems over Finite Fields: Implementations and Experiments
Language en
Publication date 2019-09-02
Authors
Aung, Tun Myat
Hla, Ni Ni
Description
Network security is a general idea to ensureinformation transmission over PC and portable systems. Ellipticcurve cryptosystems are nowadays widely used in publiccommunication channels for network security. Their securityrelies upon the complexity of clarifying the elliptic curve discretealogarithm issue. But, there are several general attacks in them.Elliptic bend number juggling is actualized over complex fields toenhance the security of elliptic curve cryptosystems. This paperstarts with the qualities of elliptic curve cryptosystems and theirsecurity administrations. At that point we talk about limited fieldnumber-crunching and its properties, prime field numbercrunching, twofold field math and complex number-crunching,and elliptic bend number-crunching over prime field and parallelfield. This paper proposes how to execute the unpredictablenumber of math under prime field and double field utilizing javaBigInteger class. also, we actualize elliptic bend math and ellipticbend cryptosystems utilizing complex numbers over prime fieldand double field and talk about our trials that got from the usage.
Keywords
complex number, elliptic bend, tests, execution, arrange security, prime field
Identifier 978-1-5386-8259-3
Journal articles
IEEE Proceeding of ICCCI 2019
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:06:39.546985
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL