Por favor, use este identificador para citar o enlazar a este item: http://hdl.handle.net/10261/42125
COMPARTIR / EXPORTAR:
logo share SHARE BASE
Visualizar otros formatos: MARC | Dublin Core | RDF | ORE | MODS | METS | DIDL | DATACITE

Invitar a revisión por pares abierta
Campo DC Valor Lengua/Idioma
dc.contributor.authorGayoso Martínez, Víctor-
dc.contributor.authorHernández Álvarez, Fernando-
dc.contributor.authorHernández Encinas, Luis-
dc.contributor.authorSánchez Ávila, Carmen-
dc.date.accessioned2011-11-04T13:31:47Z-
dc.date.available2011-11-04T13:31:47Z-
dc.date.issued2011-
dc.identifier.citationJournal of Information Assurance and Security 6(4) : 285-293 (2011)es_ES
dc.identifier.issn1554-1010-
dc.identifier.urihttp://hdl.handle.net/10261/42125-
dc.description9 páginas, 1 figura, 10 tablases_ES
dc.description.abstractElliptic Curve Cryptography (ECC) can be used as a tool for encrypting data, creating digital signatures or performing key exchanges. Regarding the encryption procedure, the schemes currently used are known as hybrid cryptosystems, as they use both symmetric and asymmetric techniques. Among those hybrid cryptosystems based on ECC, the Elliptic Curve Integrated Encryption Scheme (ECIES) is the best known, and as such it can be found in several cryptographic standards. In this work, we present an extensive review and comparison of the versions of ECIES included in documents from ANSI, IEEE, ISO/IEC, and SECG, highlighting the main differences between them that may prevent fully interoperable implementations of ECIES. In addition, a detailed list of the functions and capabilities needed by ECIES and available in Java Card is presented, which allows to provide some conclusions about the practical limitations of a Java Card implementation of ECIES.es_ES
dc.description.sponsorshipThis work has been partially supported by Ministerio de Ciencia e Innovación (Spain) under the grant TEC2009-13964- C04-02, and Ministerio de Industria, Turismo y Comercio (Spain), in collaboration with CDTI and Telefónica I+D, under the project Segur@ CENIT-2007 2004.es_ES
dc.language.isoenges_ES
dc.publisherMachine Intelligence Research Labses_ES
dc.publisherDynamic Publisherses_ES
dc.rightsopenAccesses_ES
dc.subjectECIEes_ES
dc.subjectElliptic curveses_ES
dc.subjectEncryptiones_ES
dc.subjectHybrid cryptosystemes_ES
dc.subjectPublic key cryptographyes_ES
dc.subjectJava Cardes_ES
dc.titleAnalysis of ECIES and Other Cryptosystems Based on Elliptic Curveses_ES
dc.typeartículoes_ES
dc.description.peerreviewedPeer reviewedes_ES
dc.relation.publisherversionhttp://www.mirlabs.org/jias/jias_archives.htmles_ES
dc.identifier.e-issn1554-1029-
dc.type.coarhttp://purl.org/coar/resource_type/c_6501es_ES
item.openairetypeartículo-
item.cerifentitytypePublications-
item.languageiso639-1en-
item.grantfulltextopen-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.fulltextWith Fulltext-
Aparece en las colecciones: (IFA) Artículos
Ficheros en este ítem:
Show simple item record

CORE Recommender

Page view(s)

555
checked on 29-mar-2024

Download(s)

954
checked on 29-mar-2024

Google ScholarTM

Check


NOTA: Los ítems de Digital.CSIC están protegidos por copyright, con todos los derechos reservados, a menos que se indique lo contrario.