{"title":"Elliptic curve cryptography in Java","authors":"L. Deligiannidis","doi":"10.1109/ISI.2015.7165975","DOIUrl":null,"url":null,"abstract":"The strength of public key cryptography utilizing Elliptic Curves relies on the difficulty of computing discrete logarithms in a finite field. Other public key cryptographic algorithms, such as RSA, rely on the difficulty of integer factorization. We will describe how we can implement several cryptographic ECC algorithms in java, such as digital signatures, encryption/decryption and key-exchange. We will show implementation details that would help students, practitioners, and researchers implement and experiment with such algorithms.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISI.2015.7165975","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
The strength of public key cryptography utilizing Elliptic Curves relies on the difficulty of computing discrete logarithms in a finite field. Other public key cryptographic algorithms, such as RSA, rely on the difficulty of integer factorization. We will describe how we can implement several cryptographic ECC algorithms in java, such as digital signatures, encryption/decryption and key-exchange. We will show implementation details that would help students, practitioners, and researchers implement and experiment with such algorithms.