#TITLE_ALTERNATIVE#

Cryptography is a study of how to secure exchange of messages on an insecure channel. In February 2005, National Security Agency (NSA) issued a documment <br /> <br /> <br /> <br /> <br /> known as Suite B, which recommends the use of Elliptic Curve Cryptography,...

Full description

Saved in:
Bibliographic Details
Main Author: ARDIANSYAH (NIM : 10109080); Pembimbing : Dr. Muchtadi Intan Detiena, TOMY
Format: Final Project
Language:Indonesia
Online Access:https://digilib.itb.ac.id/gdl/view/19574
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Institut Teknologi Bandung
Language: Indonesia
id id-itb.:19574
spelling id-itb.:195742017-09-27T11:43:13Z#TITLE_ALTERNATIVE# ARDIANSYAH (NIM : 10109080); Pembimbing : Dr. Muchtadi Intan Detiena, TOMY Indonesia Final Project INSTITUT TEKNOLOGI BANDUNG https://digilib.itb.ac.id/gdl/view/19574 Cryptography is a study of how to secure exchange of messages on an insecure channel. In February 2005, National Security Agency (NSA) issued a documment <br /> <br /> <br /> <br /> <br /> known as Suite B, which recommends the use of Elliptic Curve Cryptography, because Elliptic Curve Cryptography can provide a higher level of security with smaller key sizes. Elliptic Curve Cryptography (ECC) schemes are public-key mechanisms which security is based on the elliptic curve discrete logarithm problem (ECDLP). One of the strongest attacks on ECC is the attack using the Pollard Rho method. This work gives experimental results on speeding Pollard Rho method for elliptic curves over binary fields using Negation and Frobenius Maps. text
institution Institut Teknologi Bandung
building Institut Teknologi Bandung Library
continent Asia
country Indonesia
Indonesia
content_provider Institut Teknologi Bandung
collection Digital ITB
language Indonesia
description Cryptography is a study of how to secure exchange of messages on an insecure channel. In February 2005, National Security Agency (NSA) issued a documment <br /> <br /> <br /> <br /> <br /> known as Suite B, which recommends the use of Elliptic Curve Cryptography, because Elliptic Curve Cryptography can provide a higher level of security with smaller key sizes. Elliptic Curve Cryptography (ECC) schemes are public-key mechanisms which security is based on the elliptic curve discrete logarithm problem (ECDLP). One of the strongest attacks on ECC is the attack using the Pollard Rho method. This work gives experimental results on speeding Pollard Rho method for elliptic curves over binary fields using Negation and Frobenius Maps.
format Final Project
author ARDIANSYAH (NIM : 10109080); Pembimbing : Dr. Muchtadi Intan Detiena, TOMY
spellingShingle ARDIANSYAH (NIM : 10109080); Pembimbing : Dr. Muchtadi Intan Detiena, TOMY
#TITLE_ALTERNATIVE#
author_facet ARDIANSYAH (NIM : 10109080); Pembimbing : Dr. Muchtadi Intan Detiena, TOMY
author_sort ARDIANSYAH (NIM : 10109080); Pembimbing : Dr. Muchtadi Intan Detiena, TOMY
title #TITLE_ALTERNATIVE#
title_short #TITLE_ALTERNATIVE#
title_full #TITLE_ALTERNATIVE#
title_fullStr #TITLE_ALTERNATIVE#
title_full_unstemmed #TITLE_ALTERNATIVE#
title_sort #title_alternative#
url https://digilib.itb.ac.id/gdl/view/19574
_version_ 1821119884115836928