Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 5
Page No. 1142 - 1147

Design and Development of Encryption Key Management Control Module Using Elliptic Curve Theory

Authors : Sang-Hyun Lee and Dong-Joon Chun

References

Ah, S.K., 2017. [Information protection elliptic curve cryptosystem emergence]. Information and Communication Technology (ICT), Uganda, East Africa. (In Korean)

Anonymous, 1999. Recommended elliptic curves for federal government use. National Institute of Standards and Technology, Gaithersburg, Maryland.

Johnson, D. and A. Menezes, 1999. The elliptic curve digital signature algorithm. MSc Thesis, Department of C&O, University of Waterloo, Waterloo, Ontario.

Kwon, T., 2000. Authentication and key agreement via memorable password. International Association for Cryptologic Research (IACR), Mumbai, India. https://eprint.iacr.org/2000/026.pdf.

Lopez, J. and R. Dahab, 2000. Performance of elliptic curve cryptosystems. Technical Report IC-00-08, Institute of Computing, Sate University of Campinas, Brazil, May, 2000.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved