Essays about: "elliptic curve method"

Showing result 1 - 5 of 6 essays containing the words elliptic curve method.

  1. 1. The Elliptic Curve Method : A Modern Approach to Integer Factorization

    University essay from KTH/Skolan för teknikvetenskap (SCI)

    Author : Felix Cao; [2023]
    Keywords : Pollard s p-1 method; Factorization; Elliptic curves; Lentra s; Elliptic curve method;

    Abstract : In this paper, we present a study of elliptic curves, focusing on theirunderlying mathematical concepts, properties and applications in numbertheory. We begin by introducing elliptic curves and their unique features,discussing their algebraic structure, and exploring their group law, pro-viding examples and geometric interpretations. READ MORE

  2. 2. On Pollard's rho method for solving the elliptic curve discrete logarithm problem

    University essay from Linnéuniversitetet/Institutionen för matematik (MA)

    Author : Jenny Falk; [2019]
    Keywords : elliptic curves; Pollard s rho method; elliptic curve discrete logarithm problem; cryptography; adding walk; mixed walk; cycle-detecting algorithm; iterating function; random walk;

    Abstract :     Cryptosystems based on elliptic curves are in wide-spread use, they are considered secure because of the difficulty to solve the elliptic curve discrete logarithm problem. Pollard's rho method is regarded as the best method for attacking the logarithm problem to date, yet it is still not efficient enough to break an elliptic curve cryptosystem. READ MORE

  3. 3. Points of High Order on Elliptic Curves : ECDSA

    University essay from Linnéuniversitetet/Institutionen för matematik (MA)

    Author : Behnaz Kouchaki Barzi; [2016]
    Keywords : Digital signature DS. ; Elliptic Curve Digital Signature Algorithm ECDSA ; Elliptic Curve Discrete Logarithm Problem ECDLP ; Baby Step; Giant Step Bs.Gs. ; Pollard’s Rho;

    Abstract : This master thesis is about Elliptic Curve Digital Signature Algorithm or ECDSA and two of the known attacks on this security system. The purpose of this thesis is to find points that are likely to be points of high order on an elliptic curve. If we have a point P of high order and if Q = mP, then we have a large set of possible values of m. READ MORE

  4. 4. On the Applicability of a Cache Side-Channel Attack on ECDSA Signatures : The Flush+Reload attack on the point multiplication in ECDSA signature generation process

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Sai Prashanth Josyula; [2015]
    Keywords : Digital signatures; Elliptic curve cryptography; GLV method; Side-channel attack;

    Abstract : Context. Digital counterparts of handwritten signatures are known as Digital Signatures. The Elliptic Curve Digital Signature Algorithm (ECDSA) is an Elliptic Curve Cryptography (ECC) primitive, which is used for generating and verifying digital signatures. READ MORE

  5. 5. Analytical and Numerical Analysis of the Acoustics of Shallow Flow Reversal Chambers

    University essay from KTH/MWL Marcus Wallenberg Laboratoriet

    Author : Alireza Qazizadeh; [2012]
    Keywords : ;

    Abstract : Flow reversal chambers are mainly used to accomplish a compact silencer design needed on a vehicle. Generally in this configuration the inlet and outlet ports are on the same face and the flow direction is reversed. READ MORE