Journal of Engineering and Applied Sciences
Year:
2018
Volume:
13
Issue:
5
Page No.
1142 - 1147
Design and Development of Encryption Key Management Control
Module Using Elliptic Curve Theory
Authors :
Sang-Hyun Lee
and
Dong-Joon Chun
References
Ah, S.K., 2017. [Information protection elliptic curve cryptosystem emergence]. Information and Communication Technology (ICT), Uganda, East Africa. (In Korean)
Anonymous, 1999. Recommended elliptic curves for federal government use. National Institute of Standards and Technology, Gaithersburg, Maryland.
Johnson, D. and A. Menezes, 1999. The elliptic curve digital signature algorithm. MSc Thesis, Department of C&O, University of Waterloo, Waterloo, Ontario.
Kwon, T., 2000. Authentication and key agreement via memorable password. International Association for Cryptologic Research (IACR), Mumbai, India. https://eprint.iacr.org/2000/026.pdf.
Lopez, J. and R. Dahab, 2000. Performance of elliptic curve cryptosystems. Technical Report IC-00-08, Institute of Computing, Sate University of Campinas, Brazil, May, 2000.