Elliptic curve cryptography over binary finite field GF(2m)

dc.contributor.authorRabah, Kefa V.O.
dc.date.accessioned2026-02-06T17:59:06Z
dc.date.issued2006
dc.departmentDoğu Akdeniz Üniversitesi
dc.description.abstractThe rapid growth of information technology that has resulted in significant advances in cryptography to protect the integrity and confidentiality of data is astounding. Elliptic curve cryptography is gaining wide acceptance as an alternative to the conventional cryptosystems (DES, RSA, AES, etc.). Elliptic curve cryptosystems require less computational power, memory, communication bandwidth and network connectivity. Elliptic curve ciphers today are based in smartcards, Personal Digital Assistants (PDAs), pagers and mobile phones and can be easily implemented with processors clocked in single digits of MHz. This study describes the basic design principle of Elliptic Curve Crypto (ECC) protocols. The ECC processor is normally used to perform elliptic curve operations for: EC Diffie -Hellman, EC ElGamal and ECDSA protocols. As an example we will implement ECC defined over binary finite field GF(2 m). © 2006 Asian Network for Scientific Information.
dc.identifier.doi10.3923/itj.2006.204.229
dc.identifier.endpage229
dc.identifier.issn1812-5638
dc.identifier.issue1
dc.identifier.scopus2-s2.0-33644601461
dc.identifier.scopusqualityN/A
dc.identifier.startpage204
dc.identifier.urihttps://doi.org/10.3923/itj.2006.204.229
dc.identifier.urihttps://search.trdizin.gov.tr/tr/yayin/detay/
dc.identifier.urihttps://hdl.handle.net/11129/7914
dc.identifier.volume5
dc.indekslendigikaynakScopus
dc.language.isoen
dc.relation.ispartofInformation Technology Journal
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı
dc.rightsinfo:eu-repo/semantics/openAccess
dc.snmzKA_Scopus_20260204
dc.subjectCryptography
dc.subjectData security
dc.subjectDH
dc.subjectECC
dc.subjectECDSA
dc.subjectElGamal
dc.subjectIPsec
dc.subjectOpenSSL
dc.subjectRSA
dc.subjectSecure communication
dc.subjectTLS
dc.subjectWireless
dc.titleElliptic curve cryptography over binary finite field GF(2m)
dc.typeArticle

Files