Report
Evaluating software packages for attacks against elliptic curve cryptography
- Abstract:
- Until the coming of quantum computers and post-quantum cryptography, elliptic curve cryptography seems to be a prime candidate for modern encryption systems. Therefore producing attacks that reduce the strength of security claims about them allows researchers to better understand the practical limits of elliptic curves for cryptography {and improving their performance may potentially allow attacks to be made against the current best practice to demonstrate weaknesses. In this paper, we will be looking at how some attacks on elliptic curve cryptography work and evaluate a number of programming languages to test their suitability for implementing an attack that uses a Grobner basis calculation.
- Publication status:
- Not published
- Peer review status:
- Reviewed (other)
Actions
Authors
- Publisher:
- Centre for Doctoral Training in Cyber Security
- Journal:
- CDT Technical Paper Series More from this journal
- Series:
- CDT Technical Paper Series
- Publication date:
- 2016-06-01
- Keywords:
- Pubs id:
-
pubs:655587
- UUID:
-
uuid:6cf9461a-ae16-42b9-8112-c9f5f5912291
- Local pid:
-
pubs:655587
- Deposit date:
-
2016-10-28
Terms of use
- Copyright holder:
- Nicholas George Moore
- Copyright date:
- 2016
- Notes:
-
This is the
published version of a technical paper "Evaluating software packages for attacks against elliptic curve cryptography", published by The Centre for Doctoral Training in Cyber Security in 2016-06
If you are the owner of this record, you can report an update to it here: Report update to this record