Publication: Security Analysis On Elliptic Curve Cryptosystem Based On Second Order Lucas Sequence Using Faults Based Attack
dc.contributor.author | Lee Feng Koo | en_US |
dc.contributor.author | Tze Jin Wong | en_US |
dc.contributor.author | Fatin Hana Naning | en_US |
dc.contributor.author | Pang Hung Yiu | en_US |
dc.contributor.author | Mohammad Hasan Abdul Sathar | en_US |
dc.contributor.author | Ahmad Fadly Nurullah Rasedee | en_US |
dc.date.accessioned | 2024-05-28T04:27:01Z | |
dc.date.available | 2024-05-28T04:27:01Z | |
dc.date.issued | 2020 | |
dc.date.submitted | 21/12/2020 | |
dc.description | Volume :9 No: 12 | en_US |
dc.description.abstract | Elliptic Curve Cryptosystem based on second order Lucas sequenceis a cryptosystem using elliptic curves over finite fields as a mask and incorporate with second order of Lucas sequence. The security of the Elliptic Curve Cryptography cryptosystem depends on the discrete logarithms. In this cryptosystem, Lucas sequence is employed to compute the ciphertext or recover the plaintext. The Elliptic Curve Cryptosystem based on second order Lucas sequence is vulnerable when the bit of the decryption key, $d$ flips by using fault based attack. | en_US |
dc.identifier.doi | https://doi.org/10.37418/amsj.9.12.69 | |
dc.identifier.epage | 10854 | |
dc.identifier.issn | 1857-8365 | |
dc.identifier.issue | 12 | |
dc.identifier.spage | 10845 | |
dc.identifier.uri | https://research-publication.com/wp-content/uploads/2020/vol-9-n12/AMSJ-2020-N12-69.pdf | |
dc.identifier.uri | https://oarep.usim.edu.my/handle/123456789/5660 | |
dc.identifier.volume | 9 | |
dc.language.iso | en_US | en_US |
dc.publisher | Union of researchers of Macedonia | en_US |
dc.relation.ispartof | Advances in Mathematics: Scientific Journal | en_US |
dc.subject | decryption, elliptic curve, encryption, keys, Lucas sequence | en_US |
dc.title | Security Analysis On Elliptic Curve Cryptosystem Based On Second Order Lucas Sequence Using Faults Based Attack | en_US |
dc.type | Article | en_US |
dspace.entity.type | Publication |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Security Analysis On Elliptic Curve Cryptosystem Based On Second Order Lucas Sequence Using Faults Based Attack.pdf
- Size:
- 202.32 KB
- Format:
- Adobe Portable Document Format