Use of Elliptic Curves in Cryptography View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

1986

AUTHORS

Victor S. Miller

ABSTRACT

We discuss the use of elliptic curves in cryptography. In particular, we propose an analogue of the Diffie-Hellmann key exchange protocol which appears to be immune from attacks of the style of Western, Miller, and Adleman. With the current bounds for infeasible attack, it appears to be about 20% faster than the Diffie-Hellmann scheme over GF(p). As computational power grows, this disparity should get rapidly bigger. More... »

PAGES

417-426

Book

TITLE

Advances in Cryptology — CRYPTO ’85 Proceedings

ISBN

978-3-540-16463-0

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/3-540-39799-x_31

DOI

http://dx.doi.org/10.1007/3-540-39799-x_31

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1022380878


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0802", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computation Theory and Mathematics", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "IBM Research \u2013 Thomas J. Watson Research Center", 
          "id": "https://www.grid.ac/institutes/grid.481554.9", 
          "name": [
            "Exploratory Computer Science, IBM Research, P.O. Box 218, Yorktown Heights, NY, 10598"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Miller", 
        "givenName": "Victor S.", 
        "id": "sg:person.015613324111.07", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015613324111.07"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1090/s0025-5718-1985-0777279-x", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1001702399"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/bf01388980", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1002011447", 
          "https://doi.org/10.1007/bf01388980"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1112/jlms/s1-41.1.193", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1017032447"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/bf01214273", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1017364077", 
          "https://doi.org/10.1007/bf01214273"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/bf01214273", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1017364077", 
          "https://doi.org/10.1007/bf01214273"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1515/crll.1965.218.79", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1020825215"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/bf01840433", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1024039582", 
          "https://doi.org/10.1007/bf01840433"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/bf01840433", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1024039582", 
          "https://doi.org/10.1007/bf01840433"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1090/s0025-5718-1985-0777280-6", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1049016443"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/3-540-39757-4_20", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1050029692", 
          "https://doi.org/10.1007/3-540-39757-4_20"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tit.1976.1055638", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061647862"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tit.1978.1055817", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061648027"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tit.1986.1057137", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061649250"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.2307/2006496", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1069694303"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/sfcs.1979.2", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1086159651"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "1986", 
    "datePublishedReg": "1986-01-01", 
    "description": "We discuss the use of elliptic curves in cryptography. In particular, we propose an analogue of the Diffie-Hellmann key exchange protocol which appears to be immune from attacks of the style of Western, Miller, and Adleman. With the current bounds for infeasible attack, it appears to be about 20% faster than the Diffie-Hellmann scheme over GF(p). As computational power grows, this disparity should get rapidly bigger.", 
    "editor": [
      {
        "familyName": "Williams", 
        "givenName": "Hugh C.", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/3-540-39799-x_31", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-540-16463-0"
      ], 
      "name": "Advances in Cryptology \u2014 CRYPTO \u201985 Proceedings", 
      "type": "Book"
    }, 
    "name": "Use of Elliptic Curves in Cryptography", 
    "pagination": "417-426", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/3-540-39799-x_31"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "6aa06922b2ffb8a538aa7cad5fcdac027d149cac8bbec54ce4925b7d94b0a356"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1022380878"
        ]
      }
    ], 
    "publisher": {
      "location": "Berlin, Heidelberg", 
      "name": "Springer Berlin Heidelberg", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/3-540-39799-x_31", 
      "https://app.dimensions.ai/details/publication/pub.1022380878"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-15T21:01", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8690_00000257.jsonl", 
    "type": "Chapter", 
    "url": "http://link.springer.com/10.1007/3-540-39799-X_31"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/3-540-39799-x_31'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/3-540-39799-x_31'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/3-540-39799-x_31'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/3-540-39799-x_31'


 

This table displays all metadata directly associated to this object as RDF triples.

107 TRIPLES      23 PREDICATES      40 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/3-540-39799-x_31 schema:about anzsrc-for:08
2 anzsrc-for:0802
3 schema:author N481b1edf015a40c9aff874da1ddd8441
4 schema:citation sg:pub.10.1007/3-540-39757-4_20
5 sg:pub.10.1007/bf01214273
6 sg:pub.10.1007/bf01388980
7 sg:pub.10.1007/bf01840433
8 https://doi.org/10.1090/s0025-5718-1985-0777279-x
9 https://doi.org/10.1090/s0025-5718-1985-0777280-6
10 https://doi.org/10.1109/sfcs.1979.2
11 https://doi.org/10.1109/tit.1976.1055638
12 https://doi.org/10.1109/tit.1978.1055817
13 https://doi.org/10.1109/tit.1986.1057137
14 https://doi.org/10.1112/jlms/s1-41.1.193
15 https://doi.org/10.1515/crll.1965.218.79
16 https://doi.org/10.2307/2006496
17 schema:datePublished 1986
18 schema:datePublishedReg 1986-01-01
19 schema:description We discuss the use of elliptic curves in cryptography. In particular, we propose an analogue of the Diffie-Hellmann key exchange protocol which appears to be immune from attacks of the style of Western, Miller, and Adleman. With the current bounds for infeasible attack, it appears to be about 20% faster than the Diffie-Hellmann scheme over GF(p). As computational power grows, this disparity should get rapidly bigger.
20 schema:editor Nb80b57fcc7334e3482e7dc9c6858c363
21 schema:genre chapter
22 schema:inLanguage en
23 schema:isAccessibleForFree true
24 schema:isPartOf N733a9f2e62f049a4bfa83409a2ba2c88
25 schema:name Use of Elliptic Curves in Cryptography
26 schema:pagination 417-426
27 schema:productId N1bacff63c3f14f9abaaa837c7fe57655
28 N4679eadb6b7a46a195a623f73aaa6e43
29 Neff9c82b9b294a0cbd1da9b0cafaa986
30 schema:publisher N5660446e4f9243c88237d953098eb437
31 schema:sameAs https://app.dimensions.ai/details/publication/pub.1022380878
32 https://doi.org/10.1007/3-540-39799-x_31
33 schema:sdDatePublished 2019-04-15T21:01
34 schema:sdLicense https://scigraph.springernature.com/explorer/license/
35 schema:sdPublisher N858d3dac05284a65be5ab9de159bbf4b
36 schema:url http://link.springer.com/10.1007/3-540-39799-X_31
37 sgo:license sg:explorer/license/
38 sgo:sdDataset chapters
39 rdf:type schema:Chapter
40 N1bacff63c3f14f9abaaa837c7fe57655 schema:name dimensions_id
41 schema:value pub.1022380878
42 rdf:type schema:PropertyValue
43 N4679eadb6b7a46a195a623f73aaa6e43 schema:name doi
44 schema:value 10.1007/3-540-39799-x_31
45 rdf:type schema:PropertyValue
46 N481b1edf015a40c9aff874da1ddd8441 rdf:first sg:person.015613324111.07
47 rdf:rest rdf:nil
48 N5660446e4f9243c88237d953098eb437 schema:location Berlin, Heidelberg
49 schema:name Springer Berlin Heidelberg
50 rdf:type schema:Organisation
51 N733a9f2e62f049a4bfa83409a2ba2c88 schema:isbn 978-3-540-16463-0
52 schema:name Advances in Cryptology — CRYPTO ’85 Proceedings
53 rdf:type schema:Book
54 N858d3dac05284a65be5ab9de159bbf4b schema:name Springer Nature - SN SciGraph project
55 rdf:type schema:Organization
56 N99097697d8c04a6ebf88ee17f68c8813 schema:familyName Williams
57 schema:givenName Hugh C.
58 rdf:type schema:Person
59 Nb80b57fcc7334e3482e7dc9c6858c363 rdf:first N99097697d8c04a6ebf88ee17f68c8813
60 rdf:rest rdf:nil
61 Neff9c82b9b294a0cbd1da9b0cafaa986 schema:name readcube_id
62 schema:value 6aa06922b2ffb8a538aa7cad5fcdac027d149cac8bbec54ce4925b7d94b0a356
63 rdf:type schema:PropertyValue
64 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
65 schema:name Information and Computing Sciences
66 rdf:type schema:DefinedTerm
67 anzsrc-for:0802 schema:inDefinedTermSet anzsrc-for:
68 schema:name Computation Theory and Mathematics
69 rdf:type schema:DefinedTerm
70 sg:person.015613324111.07 schema:affiliation https://www.grid.ac/institutes/grid.481554.9
71 schema:familyName Miller
72 schema:givenName Victor S.
73 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015613324111.07
74 rdf:type schema:Person
75 sg:pub.10.1007/3-540-39757-4_20 schema:sameAs https://app.dimensions.ai/details/publication/pub.1050029692
76 https://doi.org/10.1007/3-540-39757-4_20
77 rdf:type schema:CreativeWork
78 sg:pub.10.1007/bf01214273 schema:sameAs https://app.dimensions.ai/details/publication/pub.1017364077
79 https://doi.org/10.1007/bf01214273
80 rdf:type schema:CreativeWork
81 sg:pub.10.1007/bf01388980 schema:sameAs https://app.dimensions.ai/details/publication/pub.1002011447
82 https://doi.org/10.1007/bf01388980
83 rdf:type schema:CreativeWork
84 sg:pub.10.1007/bf01840433 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024039582
85 https://doi.org/10.1007/bf01840433
86 rdf:type schema:CreativeWork
87 https://doi.org/10.1090/s0025-5718-1985-0777279-x schema:sameAs https://app.dimensions.ai/details/publication/pub.1001702399
88 rdf:type schema:CreativeWork
89 https://doi.org/10.1090/s0025-5718-1985-0777280-6 schema:sameAs https://app.dimensions.ai/details/publication/pub.1049016443
90 rdf:type schema:CreativeWork
91 https://doi.org/10.1109/sfcs.1979.2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1086159651
92 rdf:type schema:CreativeWork
93 https://doi.org/10.1109/tit.1976.1055638 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061647862
94 rdf:type schema:CreativeWork
95 https://doi.org/10.1109/tit.1978.1055817 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061648027
96 rdf:type schema:CreativeWork
97 https://doi.org/10.1109/tit.1986.1057137 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061649250
98 rdf:type schema:CreativeWork
99 https://doi.org/10.1112/jlms/s1-41.1.193 schema:sameAs https://app.dimensions.ai/details/publication/pub.1017032447
100 rdf:type schema:CreativeWork
101 https://doi.org/10.1515/crll.1965.218.79 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020825215
102 rdf:type schema:CreativeWork
103 https://doi.org/10.2307/2006496 schema:sameAs https://app.dimensions.ai/details/publication/pub.1069694303
104 rdf:type schema:CreativeWork
105 https://www.grid.ac/institutes/grid.481554.9 schema:alternateName IBM Research – Thomas J. Watson Research Center
106 schema:name Exploratory Computer Science, IBM Research, P.O. Box 218, Yorktown Heights, NY, 10598
107 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...