Cryptanalysis of elliptic curve cryptosystems

Download
2000
Okhovat, Nima

Suggestions

Cryptographic test methods for block ciphers
Acar, R. Cüneyt; Yücel, Melek D.; Department of Electrical and Electronics Engineering (1999)
CRYPTOGRAPHIC PROTOCOLS OF SIGNAL AND SIGNAL BASED INSTANT MESSAGING APPLICATIONS
Dinçer, Hilal; Doğanaksoy, Ali; Gürkan Balıkçıoğlu, Pınar; Department of Cryptography (2022-8-22)
Instant messaging applications have replaced classical messaging in recent years. The fact that instant messaging applications transmit messages over the internet, therefore, being free and fast, played a major role in this rise. However, being internet-based has brought disadvantages as well as advantages. There are risks such as obtaining the message, changing the message, etc. by third parties. To avoid these risks, messages are encrypted, the sender is authenticated and their integrity is shown. However...
Cryptographic Misuse Detection Tools
Koru, Emine Selin; Cenk, Murat; Gürkan Balıkçıoğlu, Pınar; Department of Cryptography (2021-9-24)
Today digital devices are an inevitable part of our lives. We use these devices for things like sharing photos, communicating with friends, and exchanging money. All these actions need privacy. In fact, properly used cryptographic systems can fulfill this need for privacy. However, in some cases developers can make mistakes, because of the reason such as lack of knowledge about cryptography and hard usage of cryptographic APIs. Thus, cryptographic misuse detection has become a new field of study and tools h...
Cryptographic modules validation process according to the FIPS 140 and ISO/IEC 15408
Yener, Cansu; Doğanaksoy, Ali; Yayla, Oğuz; Department of Cryptography (2020-9)
With the advancement of technology, questions have arisen regarding the reliability of information technology products. Some standards have emerged to ensure the reliability of these products and to validate this reliability internationally. One of the standards issued to meet this need is ISO/IEC 15408 Common Criteria Standard. Thanks to this standard, the relevant institutions authorized to evaluate information technology products are evaluated and the reliability of this product is provided by the certif...
Elliptic curves and use of their endomorphism rings in cryptography
Sülçe, Ali Mert; Akyıldız, Ersan; Department of Cryptography (2019)
Although elliptic curves have been studied for hundreds of years, the inception of elliptic curve cryptography is 1985 by Koblitz’s and Miller’s independent proposals that is based on the discrete logarithm problem on an elliptic curve defined over a finite field. After that date, there are a lot of advances and studies in elliptic curve cryptography(ECC) which provide high security with relatively small block sizes and high speed compared to the other public key cryptosystems. For instance, 160-bit ellipti...
Citation Formats
N. Okhovat, “Cryptanalysis of elliptic curve cryptosystems,” Middle East Technical University, 2000.