Cargando…
Security analysis of elliptic curves with embedding degree 1 proposed in PLOS ONE 2016
Wang et al. proposed a method for obtaining elliptic curves with embedding degree 1 for securing critical infrastructures, and presented several elliptic curves generated by their method with torsion points of 160 bits and 189 bits orders. They also presented some experimental results and claimed th...
Autor principal: | Teruya, Tadanori |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Public Library of Science
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6380619/ https://www.ncbi.nlm.nih.gov/pubmed/30779766 http://dx.doi.org/10.1371/journal.pone.0212310 |
Ejemplares similares
-
Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures
por: Wang, Maocai, et al.
Publicado: (2016) -
PLOS ONE 2016 Reviewer and Editorial Board Thank You
Publicado: (2017) -
Elliptic functions and elliptic curves
por: Du Val, Patrick
Publicado: (1973) -
Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems
por: Tidrea, Alexandra, et al.
Publicado: (2023) -
Elliptic curves
por: Husemöller, Dale
Publicado: (1987)