Report icon

Report

Evaluating software packages for attacks against elliptic curve cryptography

Abstract:
Until the coming of quantum computers and post-quantum cryptography, elliptic curve cryptography seems to be a prime candidate for modern encryption systems. Therefore producing attacks that reduce the strength of security claims about them allows researchers to better understand the practical limits of elliptic curves for cryptography {and improving their performance may potentially allow attacks to be made against the current best practice to demonstrate weaknesses. In this paper, we will be looking at how some attacks on elliptic curve cryptography work and evaluate a number of programming languages to test their suitability for implementing an attack that uses a Grobner basis calculation.
Publication status:
Not published
Peer review status:
Reviewed (other)

Actions


Access Document


Files:

Authors


More by this author
Institution:
University of Oxford
Division:
MPLS
Department:
Computer Science
Role:
Author


Publisher:
Centre for Doctoral Training in Cyber Security
Journal:
CDT Technical Paper Series More from this journal
Series:
CDT Technical Paper Series
Publication date:
2016-06-01


Keywords:
Pubs id:
pubs:655587
UUID:
uuid:6cf9461a-ae16-42b9-8112-c9f5f5912291
Local pid:
pubs:655587
Deposit date:
2016-10-28

Terms of use



Views and Downloads






If you are the owner of this record, you can report an update to it here: Report update to this record

TO TOP