Por favor, use este identificador para citar o enlazar a este item:
http://hdl.handle.net/10261/32671
COMPARTIR / EXPORTAR:
SHARE BASE | |
Visualizar otros formatos: MARC | Dublin Core | RDF | ORE | MODS | METS | DIDL | DATACITE | |
Campo DC | Valor | Lengua/Idioma |
---|---|---|
dc.contributor.author | Gayoso Martínez, Víctor | - |
dc.contributor.author | Hernández Encinas, Luis | - |
dc.contributor.author | Sánchez Ávila, Carmen | - |
dc.date.accessioned | 2011-02-22T12:07:18Z | - |
dc.date.available | 2011-02-22T12:07:18Z | - |
dc.date.issued | 2010 | - |
dc.identifier.uri | http://hdl.handle.net/10261/32671 | - |
dc.description.abstract | Elliptic Curve Cryptography (ECC) is a relatively recent branch of cryptography based on the arithmetic of elliptic curves and the Elliptic Curve Discrete Logarithm Problem (ECDLP). Elliptic curve cryptographic schemes are public-key mechanisms that provide encryption, digital signature and key exchange capabilities. The best known encryption scheme based on ECC is the Elliptic Curve Integrated Encryption Scheme (ECIES), included in the ANSI X9.63, ISO/IEC 18033-2, IEEE 1363a, and SECG SEC 1 standards. In the present work, we offer a comprehensive introduction to ECIES, detailing the encryption and decryption procedures and the list of functions and special characteristics included in aforementioned standards | es_ES |
dc.description.sponsorship | This work has been partially supported by Ministerio de Ciencia e Innovación (Spain) under the grant TEC2009-13964-C04-02 and Ministerio de Industria, Turismo y Comercio (Spain) in collaboration with CDTI and Telefónica I+D under the project Segur@ CENIT-2007 2004 | es_ES |
dc.language.iso | eng | es_ES |
dc.relation.ispartofseries | JOURNAL OF COMPUTER SCIENCE AND ENGINEERING | es_ES |
dc.relation.ispartofseries | 2, 2 (2010), 7-13 | es_ES |
dc.rights | openAccess | es_ES |
dc.subject | Elliptic Curve Cryptography | es_ES |
dc.subject | ECIES | es_ES |
dc.subject | encryption scheme | es_ES |
dc.title | A Survey of the Elliptic Curve Integrated Encryption Scheme | es_ES |
dc.type | artículo | es_ES |
dc.description.peerreviewed | Peer reviewed | es_ES |
dc.type.coar | http://purl.org/coar/resource_type/c_6501 | es_ES |
item.openairetype | artículo | - |
item.cerifentitytype | Publications | - |
item.languageiso639-1 | en | - |
item.grantfulltext | open | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.fulltext | With Fulltext | - |
Aparece en las colecciones: | (IFA) Artículos |
Ficheros en este ítem:
Fichero | Descripción | Tamaño | Formato | |
---|---|---|---|---|
V2-I2-P7-13.pdf | 406,21 kB | Adobe PDF | Visualizar/Abrir |
CORE Recommender
Page view(s)
2.379
checked on 29-mar-2024
Download(s)
3.500
checked on 29-mar-2024
Google ScholarTM
Check
NOTA: Los ítems de Digital.CSIC están protegidos por copyright, con todos los derechos reservados, a menos que se indique lo contrario.