How to generate cryptographically strong sequences of pseudo-random bits
SIAM Journal on Computing
A pseudo-random bit generator based on elliptic logarithms
Proceedings on Advances in cryptology---CRYPTO '86
One-way functions and Pseudorandom generators
Combinatorica - Theory of Computing
A VLSI Architecture for Fast Inversion in GF(2/sup m/)
IEEE Transactions on Computers
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Low-Complexity Bit-Parallel Canonical and Normal Basis Multipliers for a Class of Finite Fields
IEEE Transactions on Computers
Foundations of Cryptography: Basic Tools
Foundations of Cryptography: Basic Tools
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Elliptic Curve Public Key Cryptosystems
Elliptic Curve Public Key Cryptosystems
An FPGA implementation of an elliptic curve processor GF(2m)
Proceedings of the 14th ACM Great Lakes symposium on VLSI
On the existence of pseudorandom generators
SFCS '88 Proceedings of the 29th Annual Symposium on Foundations of Computer Science
Encryption System with Variable Number of Registers
Computers and Electrical Engineering
Efficient utilization of elliptic curve cryptosystem for hierarchical access control
Journal of Systems and Software
Elliptic curve cryptography: survey and its security applications
ACAI '11 Proceedings of the International Conference on Advances in Computing and Artificial Intelligence
Key generation based on elliptic curve over finite prime field
International Journal of Electronic Security and Digital Forensics
Hi-index | 0.24 |
Three new algorithms for the development of stream cipher based on elliptic curve point multiplication are presented in this paper. Extensive analysis of the properties of keystreams produced by various algorithms available in literature for the generation of Pseudorandom Bit Sequence (PRBS) based on the elliptic curve is carried out. New algorithms are proposed as modifications over these schemes in such a way that the weakness of these schemes in terms of reduced cryptographic strength and periodicity are overcome. Since elliptic curve cryptography is replacing RSA in most of the cryptosystems as the standard for key exchange, an EC based stream cipher provides a good option for encryption using the available infrastructure for elliptic curve point multiplication.