Efficient and Secure ECDSA Algorithm and its Applications: A Survey

02/27/2019
by   Mishall Al-Zubaidie, et al.
0

Public-key cryptography algorithms, especially elliptic curve cryptography (ECC) and elliptic curve digital signature algorithm (ECDSA) have been attracting attention from many researchers in different institutions because these algorithms provide security and high performance when being used in many areas such as electronic-healthcare, electronic-banking, electronic-commerce, electronic-vehicular, and electronic-governance. These algorithms heighten security against various attacks and at the same time improve performance to obtain efficiencies (time, memory, reduced computation complexity, and energy saving) in an environment of the constrained source and large systems. This paper presents detailed and a comprehensive survey of an update of the ECDSA algorithm in terms of performance, security, and applications.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/09/2018

A Secure Multiple Elliptic Curves Digital Signature Algorithm for Blockchain

Most cryptocurrency systems or systems based on blockchain technology ar...
research
03/25/2020

Parallel Computation of Optimal Ate Cryptographic Pairings at the 128, 192 and 256-bit security levels using elliptic net algorithm

Efficient computations of pairings with Miller Algorithm have recently r...
research
07/13/2023

Design and Analysis of Pairing-Friendly Elliptic Curves for Cryptographic Primitives

Elliptic curve cryptography (ECC) is a remarkable mathematical tool that...
research
11/09/2012

Secured Wireless Communication using Fuzzy Logic based High Speed Public-Key Cryptography (FLHSPKC)

In this paper secured wireless communication using fuzzy logic based hig...
research
09/25/2021

Implementing ECC on Data Link Layer of the OSI Reference Model

The Internet, a rapidly expanding communication infrastructure, poses si...
research
07/16/2019

A New Distribution Version of Boneh-Goh-Nissim Cryptosystem: Security and performance analysis

The aim of this paper is to provide two distributed versions of the Bone...
research
11/07/2017

Pre-shared Key Agreement for Secure Public Wi-Fi

This paper presents a novel pre-shared key (PSK) agreement scheme to est...

Please sign up or login with your details

Forgot password? Click here to reset