Index Link

  • RootNode

Item

{"_buckets": {"deposit": "8f965031-8a87-4625-b391-8b868589c868"}, "_deposit": {"id": "4570", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4570"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4570", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "A Complex Number Approach to Elliptic Curve Cryptosystems over Finite Fields:  Implementations and Experiments", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Network security is a general idea to ensureinformation transmission over PC and portable systems. Ellipticcurve cryptosystems are nowadays widely used in publiccommunication channels for network security. Their securityrelies upon the complexity of clarifying the elliptic curve discretealogarithm issue. But, there are several general attacks in them.Elliptic bend number juggling is actualized over complex fields toenhance the security of elliptic curve cryptosystems. This paperstarts with the qualities of elliptic curve cryptosystems and theirsecurity administrations. At that point we talk about limited fieldnumber-crunching and its properties, prime field numbercrunching, twofold field math and complex number-crunching,and elliptic bend number-crunching over prime field and parallelfield. This paper proposes how to execute the unpredictablenumber of math under prime field and double field utilizing javaBigInteger class. also, we actualize elliptic bend math and ellipticbend cryptosystems utilizing complex numbers over prime fieldand double field and talk about our trials that got from the usage."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "complex number"}, {"interim": "elliptic bend"}, {"interim": "tests"}, {"interim": "execution"}, {"interim": "arrange security"}, {"interim": "prime field"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2020-02-14"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "12- ICCCI-IEEE Publication- Scopus- paper 2019.pdf", "filesize": [{"value": "172 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 172000.0, "url": {"url": "https://meral.edu.mm/record/4570/files/12- ICCCI-IEEE Publication- Scopus- paper 2019.pdf"}, "version_id": "332c563d-69a9-4855-8f7b-1cdfeb056375"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "IEEE Proceeding of ICCCI 2019", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Aung, Tun Myat"}, {"subitem_authors_fullname": "Hla, Ni Ni"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2019-09-02"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "978-1-5386-8259-3"}, "item_title": "A Complex Number Approach to Elliptic Curve Cryptosystems over Finite Fields:  Implementations and Experiments", "item_type_id": "21", "owner": "1", "path": ["1597824227696"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004570", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2020-02-14"}, "publish_date": "2020-02-14", "publish_status": "0", "recid": "4570", "relation": {}, "relation_version_is_last": true, "title": ["A Complex Number Approach to Elliptic Curve Cryptosystems over Finite Fields:  Implementations and Experiments"], "weko_shared_id": -1}

A Complex Number Approach to Elliptic Curve Cryptosystems over Finite Fields: Implementations and Experiments

http://hdl.handle.net/20.500.12678/0000004570
2966947f-e136-40d9-b155-37ddee359f85
8f965031-8a87-4625-b391-8b868589c868
None
Name / File License Actions
12- 12- ICCCI-IEEE Publication- Scopus- paper 2019.pdf (172 Kb)
Publication type
Article
Upload type
Publication
Title
Title A Complex Number Approach to Elliptic Curve Cryptosystems over Finite Fields: Implementations and Experiments
Language en
Publication date 2019-09-02
Authors
Aung, Tun Myat
Hla, Ni Ni
Description
Network security is a general idea to ensureinformation transmission over PC and portable systems. Ellipticcurve cryptosystems are nowadays widely used in publiccommunication channels for network security. Their securityrelies upon the complexity of clarifying the elliptic curve discretealogarithm issue. But, there are several general attacks in them.Elliptic bend number juggling is actualized over complex fields toenhance the security of elliptic curve cryptosystems. This paperstarts with the qualities of elliptic curve cryptosystems and theirsecurity administrations. At that point we talk about limited fieldnumber-crunching and its properties, prime field numbercrunching, twofold field math and complex number-crunching,and elliptic bend number-crunching over prime field and parallelfield. This paper proposes how to execute the unpredictablenumber of math under prime field and double field utilizing javaBigInteger class. also, we actualize elliptic bend math and ellipticbend cryptosystems utilizing complex numbers over prime fieldand double field and talk about our trials that got from the usage.
Keywords
complex number, elliptic bend, tests, execution, arrange security, prime field
Identifier 978-1-5386-8259-3
Journal articles
IEEE Proceeding of ICCCI 2019
Conference papers
Books/reports/chapters
Thesis/dissertations
0
0
views
downloads
Views Downloads

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats