Fast generation of elliptic curves with prime order over extension field of even extension degree

Yasuyuki Nogami, Yoshitaka Morikawa

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

Information security technology has played a key role in protecting the equipment or some important information from evil internet users. RSA cryptosytem is the most widely used public-key cryptosystem but its key for ensuring sufficient security reachers about 2000 bits long. Hence, it is not efficient to implement RSA cryptosystem on terminal with scarce computation resources. On the other hand, elliptic curve cryptosystem (ECC) has the same security level with about 7-fold smaller length key as compared to RSA cryptosystem. Evidence suggests that ECC is more practical as compared to RSA.

Original languageEnglish
Title of host publicationIEEE International Symposium on Information Theory - Proceedings
Pages18
Number of pages1
Publication statusPublished - 2003
EventProceedings 2003 IEEE International Symposium on Information Theory (ISIT) - Yokohama, Japan
Duration: Jun 29 2003Jul 4 2003

Other

OtherProceedings 2003 IEEE International Symposium on Information Theory (ISIT)
CountryJapan
CityYokohama
Period6/29/037/4/03

Fingerprint

Cryptography
Security of data
Internet

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Cite this

Nogami, Y., & Morikawa, Y. (2003). Fast generation of elliptic curves with prime order over extension field of even extension degree. In IEEE International Symposium on Information Theory - Proceedings (pp. 18)

Fast generation of elliptic curves with prime order over extension field of even extension degree. / Nogami, Yasuyuki; Morikawa, Yoshitaka.

IEEE International Symposium on Information Theory - Proceedings. 2003. p. 18.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Nogami, Y & Morikawa, Y 2003, Fast generation of elliptic curves with prime order over extension field of even extension degree. in IEEE International Symposium on Information Theory - Proceedings. pp. 18, Proceedings 2003 IEEE International Symposium on Information Theory (ISIT), Yokohama, Japan, 6/29/03.
Nogami Y, Morikawa Y. Fast generation of elliptic curves with prime order over extension field of even extension degree. In IEEE International Symposium on Information Theory - Proceedings. 2003. p. 18
Nogami, Yasuyuki ; Morikawa, Yoshitaka. / Fast generation of elliptic curves with prime order over extension field of even extension degree. IEEE International Symposium on Information Theory - Proceedings. 2003. pp. 18
@inproceedings{53a59dd6dcac4c0fb1264963c6d77126,
title = "Fast generation of elliptic curves with prime order over extension field of even extension degree",
abstract = "Information security technology has played a key role in protecting the equipment or some important information from evil internet users. RSA cryptosytem is the most widely used public-key cryptosystem but its key for ensuring sufficient security reachers about 2000 bits long. Hence, it is not efficient to implement RSA cryptosystem on terminal with scarce computation resources. On the other hand, elliptic curve cryptosystem (ECC) has the same security level with about 7-fold smaller length key as compared to RSA cryptosystem. Evidence suggests that ECC is more practical as compared to RSA.",
author = "Yasuyuki Nogami and Yoshitaka Morikawa",
year = "2003",
language = "English",
pages = "18",
booktitle = "IEEE International Symposium on Information Theory - Proceedings",

}

TY - GEN

T1 - Fast generation of elliptic curves with prime order over extension field of even extension degree

AU - Nogami, Yasuyuki

AU - Morikawa, Yoshitaka

PY - 2003

Y1 - 2003

N2 - Information security technology has played a key role in protecting the equipment or some important information from evil internet users. RSA cryptosytem is the most widely used public-key cryptosystem but its key for ensuring sufficient security reachers about 2000 bits long. Hence, it is not efficient to implement RSA cryptosystem on terminal with scarce computation resources. On the other hand, elliptic curve cryptosystem (ECC) has the same security level with about 7-fold smaller length key as compared to RSA cryptosystem. Evidence suggests that ECC is more practical as compared to RSA.

AB - Information security technology has played a key role in protecting the equipment or some important information from evil internet users. RSA cryptosytem is the most widely used public-key cryptosystem but its key for ensuring sufficient security reachers about 2000 bits long. Hence, it is not efficient to implement RSA cryptosystem on terminal with scarce computation resources. On the other hand, elliptic curve cryptosystem (ECC) has the same security level with about 7-fold smaller length key as compared to RSA cryptosystem. Evidence suggests that ECC is more practical as compared to RSA.

UR - http://www.scopus.com/inward/record.url?scp=0142008696&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0142008696&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:0142008696

SP - 18

BT - IEEE International Symposium on Information Theory - Proceedings

ER -