MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "8f965031-8a87-4625-b391-8b868589c868"}, "_deposit": {"id": "4570", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4570"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4570", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "A Complex Number Approach to Elliptic Curve Cryptosystems over Finite Fields: Implementations and Experiments", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Network security is a general idea to ensureinformation transmission over PC and portable systems. Ellipticcurve cryptosystems are nowadays widely used in publiccommunication channels for network security. Their securityrelies upon the complexity of clarifying the elliptic curve discretealogarithm issue. But, there are several general attacks in them.Elliptic bend number juggling is actualized over complex fields toenhance the security of elliptic curve cryptosystems. This paperstarts with the qualities of elliptic curve cryptosystems and theirsecurity administrations. At that point we talk about limited fieldnumber-crunching and its properties, prime field numbercrunching, twofold field math and complex number-crunching,and elliptic bend number-crunching over prime field and parallelfield. This paper proposes how to execute the unpredictablenumber of math under prime field and double field utilizing javaBigInteger class. also, we actualize elliptic bend math and ellipticbend cryptosystems utilizing complex numbers over prime fieldand double field and talk about our trials that got from the usage."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "complex number"}, {"interim": "elliptic bend"}, {"interim": "tests"}, {"interim": "execution"}, {"interim": "arrange security"}, {"interim": "prime field"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2020-02-14"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "12- ICCCI-IEEE Publication- Scopus- paper 2019.pdf", "filesize": [{"value": "172 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 172000.0, "url": {"url": "https://meral.edu.mm/record/4570/files/12- ICCCI-IEEE Publication- Scopus- paper 2019.pdf"}, "version_id": "332c563d-69a9-4855-8f7b-1cdfeb056375"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "IEEE Proceeding of ICCCI 2019", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Aung, Tun Myat"}, {"subitem_authors_fullname": "Hla, Ni Ni"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2019-09-02"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "978-1-5386-8259-3"}, "item_title": "A Complex Number Approach to Elliptic Curve Cryptosystems over Finite Fields: Implementations and Experiments", "item_type_id": "21", "owner": "1", "path": ["1597824227696"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004570", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2020-02-14"}, "publish_date": "2020-02-14", "publish_status": "0", "recid": "4570", "relation": {}, "relation_version_is_last": true, "title": ["A Complex Number Approach to Elliptic Curve Cryptosystems over Finite Fields: Implementations and Experiments"], "weko_shared_id": -1}
A Complex Number Approach to Elliptic Curve Cryptosystems over Finite Fields: Implementations and Experiments
http://hdl.handle.net/20.500.12678/0000004570
http://hdl.handle.net/20.500.12678/00000045702966947f-e136-40d9-b155-37ddee359f85
8f965031-8a87-4625-b391-8b868589c868
Name / File | License | Actions |
---|---|---|
12- ICCCI-IEEE Publication- Scopus- paper 2019.pdf (172 Kb)
|
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | A Complex Number Approach to Elliptic Curve Cryptosystems over Finite Fields: Implementations and Experiments | |||||
Language | en | |||||
Publication date | 2019-09-02 | |||||
Authors | ||||||
Aung, Tun Myat | ||||||
Hla, Ni Ni | ||||||
Description | ||||||
Network security is a general idea to ensureinformation transmission over PC and portable systems. Ellipticcurve cryptosystems are nowadays widely used in publiccommunication channels for network security. Their securityrelies upon the complexity of clarifying the elliptic curve discretealogarithm issue. But, there are several general attacks in them.Elliptic bend number juggling is actualized over complex fields toenhance the security of elliptic curve cryptosystems. This paperstarts with the qualities of elliptic curve cryptosystems and theirsecurity administrations. At that point we talk about limited fieldnumber-crunching and its properties, prime field numbercrunching, twofold field math and complex number-crunching,and elliptic bend number-crunching over prime field and parallelfield. This paper proposes how to execute the unpredictablenumber of math under prime field and double field utilizing javaBigInteger class. also, we actualize elliptic bend math and ellipticbend cryptosystems utilizing complex numbers over prime fieldand double field and talk about our trials that got from the usage. | ||||||
Keywords | ||||||
complex number, elliptic bend, tests, execution, arrange security, prime field | ||||||
Identifier | 978-1-5386-8259-3 | |||||
Journal articles | ||||||
IEEE Proceeding of ICCCI 2019 | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |