BibTex RIS Kaynak Göster
Yıl 2006, Cilt: 6 Sayı: 2, 211 - 221, 02.01.2012

Öz

Kaynakça

  • Miller, Victor S. "Elliptic Curves and their use in Cryptography" DIMACS Workshop on Unusual Applications of Number Theory, 21 March 1997
  • Win, Erik De and Preneel, "Elliptic Curve Public Key Cryptosystems-an introduction" State of the Art in Applied Cryptography 1997 pp.131-141
  • Stinson, Douglas R. Cryptography: Theory and Practice. CRC Press, 1995, and 2002(second edition).
  • Wade Trappe&Lawrence C. Washington, Introduction to Cryptography with Coding Theory. Prentice-Hall, 2002
  • Juristic, A. and Menezes, A. "Elliptic Curves and Cryptography." Dr. Dobb's Journal, April Johnson, D. and Menezes, A. "The Elliptic Curve Digital Signature Algorithm" Technical Report. CORR 99-34, Dep. Of C&O, University of Waterloo, Canada. Aug.23, 1999 Update: Feb. , 2000
  • Michael Rosing, Implementing Elliptic Curve Cryptography. Manning Publications Co. 1999
  • Dr. Michael J Ganley, Elliptic Curve Cryptography, Thales e-Security Limited, 2001
  • William Stallings, Cryptography and Network Security, Principles and Practice. Prentice-Hall 1999 (Second Edition)
  • M.Aydos, E.Savaş, and Ç.K.Koç, "Implementing network security protocols based on elliptic curve cryptography", Proceedings of the Fourth Symposium on Computer Networks, pp. 130-139, Istanbul, Turkey, May 20-21 1999.
  • There are, however, some problems and issues that are inhibiting the widespread adoption of elliptic curve systems. These include: - the real security of such systems is still not well understood; - difficulty of generating suitable curves; - incompatibility of implementations; - royalties and patents; - relatively slow signature verification[10,11,12]. Çetin Kaya KOÇ, Cryptography: State of the Art and Current Trends, Istanbul, Turkey, SACIS 2003 http://www.certicom.com/resources/ecc_tuto rial/ecc_tutorial.html

A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY

Yıl 2006, Cilt: 6 Sayı: 2, 211 - 221, 02.01.2012

Öz

A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY

Kaynakça

  • Miller, Victor S. "Elliptic Curves and their use in Cryptography" DIMACS Workshop on Unusual Applications of Number Theory, 21 March 1997
  • Win, Erik De and Preneel, "Elliptic Curve Public Key Cryptosystems-an introduction" State of the Art in Applied Cryptography 1997 pp.131-141
  • Stinson, Douglas R. Cryptography: Theory and Practice. CRC Press, 1995, and 2002(second edition).
  • Wade Trappe&Lawrence C. Washington, Introduction to Cryptography with Coding Theory. Prentice-Hall, 2002
  • Juristic, A. and Menezes, A. "Elliptic Curves and Cryptography." Dr. Dobb's Journal, April Johnson, D. and Menezes, A. "The Elliptic Curve Digital Signature Algorithm" Technical Report. CORR 99-34, Dep. Of C&O, University of Waterloo, Canada. Aug.23, 1999 Update: Feb. , 2000
  • Michael Rosing, Implementing Elliptic Curve Cryptography. Manning Publications Co. 1999
  • Dr. Michael J Ganley, Elliptic Curve Cryptography, Thales e-Security Limited, 2001
  • William Stallings, Cryptography and Network Security, Principles and Practice. Prentice-Hall 1999 (Second Edition)
  • M.Aydos, E.Savaş, and Ç.K.Koç, "Implementing network security protocols based on elliptic curve cryptography", Proceedings of the Fourth Symposium on Computer Networks, pp. 130-139, Istanbul, Turkey, May 20-21 1999.
  • There are, however, some problems and issues that are inhibiting the widespread adoption of elliptic curve systems. These include: - the real security of such systems is still not well understood; - difficulty of generating suitable curves; - incompatibility of implementations; - royalties and patents; - relatively slow signature verification[10,11,12]. Çetin Kaya KOÇ, Cryptography: State of the Art and Current Trends, Istanbul, Turkey, SACIS 2003 http://www.certicom.com/resources/ecc_tuto rial/ecc_tutorial.html
Toplam 10 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Bölüm Makaleler
Yazarlar

M.ali Aydın Bu kişi benim

G.zeynep Aydın

Yayımlanma Tarihi 2 Ocak 2012
Yayımlandığı Sayı Yıl 2006 Cilt: 6 Sayı: 2

Kaynak Göster

APA Aydın, M., & Aydın, G. (2012). A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY. IU-Journal of Electrical & Electronics Engineering, 6(2), 211-221.
AMA Aydın M, Aydın G. A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY. IU-Journal of Electrical & Electronics Engineering. Ocak 2012;6(2):211-221.
Chicago Aydın, M.ali, ve G.zeynep Aydın. “A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY”. IU-Journal of Electrical & Electronics Engineering 6, sy. 2 (Ocak 2012): 211-21.
EndNote Aydın M, Aydın G (01 Ocak 2012) A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY. IU-Journal of Electrical & Electronics Engineering 6 2 211–221.
IEEE M. Aydın ve G. Aydın, “A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY”, IU-Journal of Electrical & Electronics Engineering, c. 6, sy. 2, ss. 211–221, 2012.
ISNAD Aydın, M.ali - Aydın, G.zeynep. “A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY”. IU-Journal of Electrical & Electronics Engineering 6/2 (Ocak 2012), 211-221.
JAMA Aydın M, Aydın G. A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY. IU-Journal of Electrical & Electronics Engineering. 2012;6:211–221.
MLA Aydın, M.ali ve G.zeynep Aydın. “A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY”. IU-Journal of Electrical & Electronics Engineering, c. 6, sy. 2, 2012, ss. 211-2.
Vancouver Aydın M, Aydın G. A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY. IU-Journal of Electrical & Electronics Engineering. 2012;6(2):211-2.