Elliptic Curve Cryptosystems
GPTKB entity
Statements (50)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:cryptographic_system
|
| gptkbp:advantage |
lower power consumption
faster computations smaller key sizes |
| gptkbp:basedOn |
gptkb:Elliptic_Curve_Discrete_Logarithm_Problem
|
| gptkbp:contrastsWith |
gptkb:RSA
gptkb:Diffie-Hellman |
| gptkbp:dependsOn |
implementation quality
curve selection |
| gptkbp:example |
gptkb:ECIES
gptkb:ECDSA gptkb:ECDH |
| gptkbp:introduced |
gptkb:Neal_Koblitz
gptkb:Victor_S._Miller |
| gptkbp:introducedIn |
1985
|
| gptkbp:potentiallyBrokenBy |
quantum computers
|
| gptkbp:relatedTo |
gptkb:post-quantum_cryptography
pairing-based cryptography |
| gptkbp:standardizedBy |
gptkb:NIST
gptkb:SECG |
| gptkbp:subjectOf |
gptkb:crypt
mathematical research patent disputes security evaluations standardization efforts |
| gptkbp:usedFor |
encryption
public key cryptography digital signatures key exchange |
| gptkbp:usedIn |
gptkb:Bitcoin
gptkb:cryptocurrency TLS mobile devices smart cards |
| gptkbp:uses |
scalar multiplication
modular arithmetic finite fields private keys elliptic curve mathematics random curves Koblitz curves binary fields point multiplication prime fields public key pairs |
| gptkbp:vulnerableTo |
side-channel attacks
fault attacks |
| gptkbp:bfsParent |
gptkb:Elliptic_Curves
|
| gptkbp:bfsLayer |
8
|
| https://www.w3.org/2000/01/rdf-schema#label |
Elliptic Curve Cryptosystems
|