2019
DOI: 10.48550/arxiv.1902.10313
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Efficient and Secure ECDSA Algorithm and its Applications: A Survey

Abstract: Public-key cryptography algorithms, especially elliptic curve cryptography (ECC) and elliptic curve digital signature algorithm (ECDSA) have been attracting attention from many researchers in different institutions because these algorithms provide security and high performance when being used in many areas such as electronic-healthcare, electronicbanking, electronic-commerce, electronic-vehicular, and electronic-governance.These algorithms heighten security against various attacks and the same time improve per… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 128 publications
0
5
0
Order By: Relevance
“…The public key of the sender can then be used at the receiver side to verify that the entity identified by this public key has authored the message. An example is the Elliptic Curve Digital Signature Algorithm (ECDSA) [18].…”
Section: ) Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…The public key of the sender can then be used at the receiver side to verify that the entity identified by this public key has authored the message. An example is the Elliptic Curve Digital Signature Algorithm (ECDSA) [18].…”
Section: ) Authenticationmentioning
confidence: 99%
“…Authentication [18]- [24] Different technologies can be used to manage unique identities of end users and network nodes.…”
Section: Topicmentioning
confidence: 99%
“…The DSA quickly became popular and is widely used in various applications today. The early 2000s saw the introduction of the Elliptic Curve Digital Signature Algorithm (ECDSA), which is based on elliptic curve cryptography [20,21]. ECDSA is known for its small key size and fast computation time and is commonly used in resource-constrained environments.…”
Section: Related Workmentioning
confidence: 99%
“…In the typical timing attack applied to ECC cryptosystems, the attacker relies on the weakness that different key bit values during the iterations result in different computation latency [44]. On the other hand, the SPA attack applied to the ECC cryptosystem is based on the power consumption at a certain time related to the point operation being performed, which leaks the key bit value being manipulated [40].…”
Section: Passive Attacksmentioning
confidence: 99%