2010
DOI: 10.1080/19393550903482759
|View full text |Cite
|
Sign up to set email alerts
|

Random Binary and Non-Binary Sequences Derived from Random Sequence of Points on Cyclic Elliptic Curve Over Finite FieldGF(2m) and Their Properties

Abstract: In this paper, Cyclic Elliptic Curves of the form with order M is considered. A finite field GF(p) (p ≥ N, where N is the order of point P) is considered. Random sequence {k i } of integers is generated using Linear Feedback Shift Register (LFSR) over GF(p) for maximum period. Every element in sequence {k i } is mapped to k i P which is a point on Cyclic Elliptic Curve with co-ordinates say (x i , y i ). The sequence {k i P} is a random sequence of elliptic curve points. From the sequence (x i , y i ) several … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(16 citation statements)
references
References 11 publications
0
16
0
Order By: Relevance
“…During comparison, if the bits are same, then it is considered as agreement; else disagreement. Depending on the number of agreements (a) and disagreements (d) in a particular shift, the correlation values Rhafalse(τfalse) is computed using the Equation () 30 Rha(τ)=adN0<τN where N is sequence length. …”
Section: Randomness Testsmentioning
confidence: 99%
See 2 more Smart Citations
“…During comparison, if the bits are same, then it is considered as agreement; else disagreement. Depending on the number of agreements (a) and disagreements (d) in a particular shift, the correlation values Rhafalse(τfalse) is computed using the Equation () 30 Rha(τ)=adN0<τN where N is sequence length. …”
Section: Randomness Testsmentioning
confidence: 99%
“…A key sequence is said to qualify if it can resist all kinds of cryptanalytic, statistical and brute force attacks. Various security aspects in References 30,35,38,39 are considered to evaluate the proposed system. They are: key space, key sensitivity, linear complexity and correlation value.…”
Section: Security Aspectsmentioning
confidence: 99%
See 1 more Smart Citation
“…From the sequence (xi, yi) several binary and non-binary sequences can be derived and their randomness properties are investigated in [3]. Choosing a linear feedback with connection polynomial primitive over GF (p), can generate periodic sequence with maximum period [13,4]. For any choice of n-stages >1, an appropriate feedback connection can be obtained by using an n th degree primitive polynomial over GF (p).…”
Section: A Cyclic Elliptic Curve Based Pseudorandom Bit Generatormentioning
confidence: 99%
“…With the increase in available computation power, it is found for a given key size that an EC public-key cryptosystem has higher security compared to RSA cryptosystem [4]. EC operations which used in the generation of pseudo-random sequences with strong cryptographic properties have been studied in the literature, such as [5], [6], [7].…”
Section: Introductionmentioning
confidence: 99%