Please use this identifier to cite or link to this item:
logo share SHARE BASE
Visualizar otros formatos: MARC | Dublin Core | RDF | ORE | MODS | METS | DIDL | DATACITE

Analysis of ECIES and Other Cryptosystems Based on Elliptic Curves

AuthorsGayoso Martínez, Víctor CSIC ORCID; Hernández Álvarez, Fernando CSIC; Hernández Encinas, Luis CSIC ORCID ; Sánchez Ávila, Carmen
Elliptic curves
Hybrid cryptosystem
Public key cryptography
Java Card
Issue Date2011
PublisherMachine Intelligence Research Labs
Dynamic Publishers
CitationJournal of Information Assurance and Security 6(4) : 285-293 (2011)
AbstractElliptic Curve Cryptography (ECC) can be used as a tool for encrypting data, creating digital signatures or performing key exchanges. Regarding the encryption procedure, the schemes currently used are known as hybrid cryptosystems, as they use both symmetric and asymmetric techniques. Among those hybrid cryptosystems based on ECC, the Elliptic Curve Integrated Encryption Scheme (ECIES) is the best known, and as such it can be found in several cryptographic standards. In this work, we present an extensive review and comparison of the versions of ECIES included in documents from ANSI, IEEE, ISO/IEC, and SECG, highlighting the main differences between them that may prevent fully interoperable implementations of ECIES. In addition, a detailed list of the functions and capabilities needed by ECIES and available in Java Card is presented, which allows to provide some conclusions about the practical limitations of a Java Card implementation of ECIES.
Description9 páginas, 1 figura, 10 tablas
Publisher version (URL)
Appears in Collections:(IFA) Artículos

Files in This Item:
Show full item record
Review this work

Page view(s)

checked on Mar 1, 2024


checked on Mar 1, 2024

Google ScholarTM


WARNING: Items in Digital.CSIC are protected by copyright, with all rights reserved, unless otherwise indicated.