SYSTEMATIC ANALYSIS OF MATHEMATICAL FUNDAMENTALS IN ELLIPTIC CURVE CRYPTOGRAPHY: CONCEPTS, APPLICATIONS, AND CHALLENGES
Main Article Content
Abstract
Article Details
References
M. R. Khan et al., “Analysis of Elliptic Curve Cryptography & RSA,” J. ICT Stand., vol. 11, no. 4, pp. 355–378, 2023, doi: 10.13052/jicts2245-800X.1142.
S. Ullah, J. Zheng, N. Din, M. T. Hussain, F. Ullah, and M. Yousaf, “Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey,” Comput. Sci. Rev., vol. 47, p. 100530, 2023, doi: 10.1016/j.cosrev.2022.100530.
R. Soekarta and M. Sigit, “Implementation of Affine Group Algebra on Digital Image Security,” vol. 1, no. 1, pp. 137–146, 2020.
M. S. Rahmawati and R. Soekarta, “Penerapan Aljabar Pada Algoritma DES Dan Transformasi Wavelet Diskrit Dalam Program Aplikasi Keamanan Citra Digital ( Application Of Algebra In DES Algorithms And Discrete Wavelet Transform On Digital Image Security Application ),” 2018, pp. 812–818.
F. Maqsood, M. Ahmed, M. Mumtaz, and M. Ali, “Cryptography: A Comparative Analysis for Modern Techniques,” Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 6, pp. 442–448, 2017, doi: 10.14569/ijacsa.2017.080659.
K. L. Tan, A. K. S. Sim, S. S. N. Yap, S. Vithayaporn, and A. W. Rachmawati, “A systematic review of meaningful work unifying 20 years of theoretical and substantive contributions (2000–2020),” J. Adv. Manag. Res., vol. 20, no. 3, pp. 462–512, 2023, doi: 10.1108/JAMR-11-2022-0225.
V. Jara-Vera and C. Sánchez-ávila, “Some notes on a formal algebraic structure of cryptology,” Mathematics, vol. 9, no. 18, 2021, doi: 10.3390/math9182183.
Y. Hao et al., “Lightweight Architecture for Elliptic Curve Scalar Multiplication over Prime Field,” Electron., vol. 11, no. 14, pp. 1–24, 2022, doi: 10.3390/electronics11142234.
R. Sanjeewa and B. A. K. Welihinda, “Elliptic Curve Cryptography and Coding Theory,” Int. J. Multidiscip. Stud., vol. 3, no. 2, p. 99, 2017, doi: 10.4038/ijms.v3i2.12.
U. Hayat, I. Ullah, N. A. Azam, and S. Azhar, “A Novel Image Encryption Scheme Based on Elliptic Curves over Finite Rings,” Entropy, vol. 24, no. 5, pp. 1–24, 2022, doi: 10.3390/e24050571.
G. Favre et al., “Elliptic Curve Cryptography and Coding Theory,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 11, no. 1, pp. 1–24, 2022, doi: 10.4038/ijms.v3i2.12.
Y. B. W. Tama and M. F. Fahmi, “Sistem Kriptografi Klasik Dengan Memanfaatkan Orde Dari Grup Titik Pada Kurva Eliptik Bentuk Montgomery,” Euler J. Ilm. Mat. Sains dan Teknol., vol. 11, no. 2, pp. 361–371, 2023, doi: 10.37905/euler.v11i2.23009.
D. Krenn et al., “Definition and Implementation of an Elliptic Curve Cryptosystem using a New Message Mapping Scheme,” Semigr. Forum, vol. 104, no. August 2021, pp. 58–71, 2020, doi: 10.1145/3386723.3387893.
J. Renes, C. Costello, and L. Batina, “Complete addition formulas for prime order elliptic curves,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 9665, pp. 403–428, 2016, doi: 10.1007/978-3-662-49890-3_16.
D. J. Unger, “Yield criteria representable by elliptic curves and Weierstrass form,” Procedia Struct. Integr., vol. 35, no. C, pp. 2–9, 2021, doi: 10.1016/j.prostr.2021.12.041.
K. Keerthi and B. Surendiran, “Elliptic curve cryptography for secured text encryption,” Proc. IEEE Int. Conf. Circuit, Power Comput. Technol. ICCPCT 2017, no. March, 2017, doi: 10.1109/ICCPCT.2017.8074210.
D. Natanael, Faisal, and D. Suryani, “Text Encryption in Android Chat Applications using Elliptical Curve Cryptography (ECC),” Procedia Comput. Sci., vol. 135, pp. 283–291, 2018, doi: 10.1016/j.procs.2018.08.176.
A. Pakapongpun and S. Srisuk, “On the Problem of Tangency of Ellipse Curve,” Asian J. Appl. Sci., vol. 6, no. 6, pp. 542–546, 2018, doi: 10.24203/ajas.v6i6.5534.
K. A. Sattar, T. Haider, U. Hayat, and M. D. Bustamante, “An Efficient and Secure Cryptographic Algorithm Using Elliptic Curves and Max-Plus Algebra-Based Wavelet Transform,” Appl. Sci., vol. 13, no. 14, 2023, doi: 10.3390/app13148385.
B. N. Koblitz, “Elliptic Curve Cryptosystems,” vol. 4, no. 177, pp. 203–209, 1987.
V. S. Miller, “Elliptic Curves and their use in Cryptography,” Communications, pp. 1–14, 1997.
N. Sendrier, Code-Based Cryptography Post-Quantum Cryptography, no. February 2009. 2014.
R. Sanjeewa and B. A. K. Welihinda, “Elliptic Curve Cryptography and Coding Theory,” Int. J. Multidiscip. Stud., vol. 3, no. 2, p. 99, 2017, doi: 10.4038/ijms.v3i2.12.