Por favor, use este identificador para citar o enlazar a este item:
http://hdl.handle.net/10261/42125
COMPARTIR / EXPORTAR:
SHARE BASE | |
Visualizar otros formatos: MARC | Dublin Core | RDF | ORE | MODS | METS | DIDL | DATACITE | |
Campo DC | Valor | Lengua/Idioma |
---|---|---|
dc.contributor.author | Gayoso Martínez, Víctor | - |
dc.contributor.author | Hernández Álvarez, Fernando | - |
dc.contributor.author | Hernández Encinas, Luis | - |
dc.contributor.author | Sánchez Ávila, Carmen | - |
dc.date.accessioned | 2011-11-04T13:31:47Z | - |
dc.date.available | 2011-11-04T13:31:47Z | - |
dc.date.issued | 2011 | - |
dc.identifier.citation | Journal of Information Assurance and Security 6(4) : 285-293 (2011) | es_ES |
dc.identifier.issn | 1554-1010 | - |
dc.identifier.uri | http://hdl.handle.net/10261/42125 | - |
dc.description | 9 páginas, 1 figura, 10 tablas | es_ES |
dc.description.abstract | Elliptic Curve Cryptography (ECC) can be used as a tool for encrypting data, creating digital signatures or performing key exchanges. Regarding the encryption procedure, the schemes currently used are known as hybrid cryptosystems, as they use both symmetric and asymmetric techniques. Among those hybrid cryptosystems based on ECC, the Elliptic Curve Integrated Encryption Scheme (ECIES) is the best known, and as such it can be found in several cryptographic standards. In this work, we present an extensive review and comparison of the versions of ECIES included in documents from ANSI, IEEE, ISO/IEC, and SECG, highlighting the main differences between them that may prevent fully interoperable implementations of ECIES. In addition, a detailed list of the functions and capabilities needed by ECIES and available in Java Card is presented, which allows to provide some conclusions about the practical limitations of a Java Card implementation of ECIES. | es_ES |
dc.description.sponsorship | This work has been partially supported by Ministerio de Ciencia e Innovación (Spain) under the grant TEC2009-13964- C04-02, and Ministerio de Industria, Turismo y Comercio (Spain), in collaboration with CDTI and Telefónica I+D, under the project Segur@ CENIT-2007 2004. | es_ES |
dc.language.iso | eng | es_ES |
dc.publisher | Machine Intelligence Research Labs | es_ES |
dc.publisher | Dynamic Publishers | es_ES |
dc.rights | openAccess | es_ES |
dc.subject | ECIE | es_ES |
dc.subject | Elliptic curves | es_ES |
dc.subject | Encryption | es_ES |
dc.subject | Hybrid cryptosystem | es_ES |
dc.subject | Public key cryptography | es_ES |
dc.subject | Java Card | es_ES |
dc.title | Analysis of ECIES and Other Cryptosystems Based on Elliptic Curves | es_ES |
dc.type | artículo | es_ES |
dc.description.peerreviewed | Peer reviewed | es_ES |
dc.relation.publisherversion | http://www.mirlabs.org/jias/jias_archives.html | es_ES |
dc.identifier.e-issn | 1554-1029 | - |
dc.type.coar | http://purl.org/coar/resource_type/c_6501 | es_ES |
item.openairetype | artículo | - |
item.cerifentitytype | Publications | - |
item.languageiso639-1 | en | - |
item.grantfulltext | open | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.fulltext | With Fulltext | - |
Aparece en las colecciones: | (IFA) Artículos |
Ficheros en este ítem:
Fichero | Descripción | Tamaño | Formato | |
---|---|---|---|---|
Analysis of ECIES and other cryptosystems based on elliptic curves - GHHS - v1.0.pdf | 186,93 kB | Adobe PDF | Visualizar/Abrir |
CORE Recommender
Page view(s)
555
checked on 29-mar-2024
Download(s)
954
checked on 29-mar-2024
Google ScholarTM
Check
NOTA: Los ítems de Digital.CSIC están protegidos por copyright, con todos los derechos reservados, a menos que se indique lo contrario.