Publication:
Security Analysis On Elliptic Curve Cryptosystem Based On Second Order Lucas Sequence Using Faults Based Attack

dc.contributor.authorLee Feng Kooen_US
dc.contributor.authorTze Jin Wongen_US
dc.contributor.authorFatin Hana Naningen_US
dc.contributor.authorPang Hung Yiuen_US
dc.contributor.authorMohammad Hasan Abdul Satharen_US
dc.contributor.authorAhmad Fadly Nurullah Rasedeeen_US
dc.date.accessioned2024-05-28T04:27:01Z
dc.date.available2024-05-28T04:27:01Z
dc.date.issued2020
dc.date.submitted21/12/2020
dc.descriptionVolume :9 No: 12en_US
dc.description.abstractElliptic Curve Cryptosystem based on second order Lucas sequenceis a cryptosystem using elliptic curves over finite fields as a mask and incorporate with second order of Lucas sequence. The security of the Elliptic Curve Cryptography cryptosystem depends on the discrete logarithms. In this cryptosystem, Lucas sequence is employed to compute the ciphertext or recover the plaintext. The Elliptic Curve Cryptosystem based on second order Lucas sequence is vulnerable when the bit of the decryption key, $d$ flips by using fault based attack.en_US
dc.identifier.doihttps://doi.org/10.37418/amsj.9.12.69
dc.identifier.epage10854
dc.identifier.issn1857-8365
dc.identifier.issue12
dc.identifier.spage10845
dc.identifier.urihttps://research-publication.com/wp-content/uploads/2020/vol-9-n12/AMSJ-2020-N12-69.pdf
dc.identifier.urihttps://oarep.usim.edu.my/handle/123456789/5660
dc.identifier.volume9
dc.language.isoen_USen_US
dc.publisherUnion of researchers of Macedoniaen_US
dc.relation.ispartofAdvances in Mathematics: Scientific Journalen_US
dc.subjectdecryption, elliptic curve, encryption, keys, Lucas sequenceen_US
dc.titleSecurity Analysis On Elliptic Curve Cryptosystem Based On Second Order Lucas Sequence Using Faults Based Attacken_US
dc.typeArticleen_US
dspace.entity.typePublication

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Security Analysis On Elliptic Curve Cryptosystem Based On Second Order Lucas Sequence Using Faults Based Attack.pdf
Size:
202.32 KB
Format:
Adobe Portable Document Format