Public-Key Cryptosystems with Very Small Key Lengths View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

1993

AUTHORS

Greg Harper , Alfred Menezes , Scott Vanstone

ABSTRACT

In some applications of public-key cryptography it is desirable, and perhaps even necessary, that the key size be as small as possible. Moreover, the cryptosystem just needs to be secure enough so that breaking it is not cost-effective. The purpose of this paper is to investigate the security and practicality of elliptic curve cryptosystems with small key sizes of about 100 bits. More... »

PAGES

163-173

Book

TITLE

Advances in Cryptology — EUROCRYPT’ 92

ISBN

978-3-540-56413-3
978-3-540-47555-2

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/3-540-47555-9_14

DOI

http://dx.doi.org/10.1007/3-540-47555-9_14

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1030622134


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Dept. of Combinatories and Optimization, University of Waterloo, N2L 3G1, Waterloo, Ontario, Canada", 
          "id": "http://www.grid.ac/institutes/grid.46078.3d", 
          "name": [
            "Dept. of Combinatories and Optimization, University of Waterloo, N2L 3G1, Waterloo, Ontario, Canada"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Harper", 
        "givenName": "Greg", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Dept. of Combinatories and Optimization, University of Waterloo, N2L 3G1, Waterloo, Ontario, Canada", 
          "id": "http://www.grid.ac/institutes/grid.46078.3d", 
          "name": [
            "Dept. of Combinatories and Optimization, University of Waterloo, N2L 3G1, Waterloo, Ontario, Canada"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Menezes", 
        "givenName": "Alfred", 
        "id": "sg:person.012711653371.43", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012711653371.43"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Dept. of Combinatories and Optimization, University of Waterloo, N2L 3G1, Waterloo, Ontario, Canada", 
          "id": "http://www.grid.ac/institutes/grid.46078.3d", 
          "name": [
            "Dept. of Combinatories and Optimization, University of Waterloo, N2L 3G1, Waterloo, Ontario, Canada"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Vanstone", 
        "givenName": "Scott", 
        "id": "sg:person.010344544767.07", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010344544767.07"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "1993", 
    "datePublishedReg": "1993-01-01", 
    "description": "In some applications of public-key cryptography it is desirable, and perhaps even necessary, that the key size be as small as possible. Moreover, the cryptosystem just needs to be secure enough so that breaking it is not cost-effective. The purpose of this paper is to investigate the security and practicality of elliptic curve cryptosystems with small key sizes of about 100 bits.", 
    "editor": [
      {
        "familyName": "Rueppel", 
        "givenName": "Rainer A.", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/3-540-47555-9_14", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-540-56413-3", 
        "978-3-540-47555-2"
      ], 
      "name": "Advances in Cryptology \u2014 EUROCRYPT\u2019 92", 
      "type": "Book"
    }, 
    "keywords": [
      "key size", 
      "smaller key size", 
      "smaller key length", 
      "elliptic curve cryptosystem", 
      "public key cryptography", 
      "key cryptosystem", 
      "key length", 
      "cryptosystem", 
      "cryptography", 
      "security", 
      "bits", 
      "practicality", 
      "applications", 
      "purpose", 
      "size", 
      "length", 
      "paper"
    ], 
    "name": "Public-Key Cryptosystems with Very Small Key Lengths", 
    "pagination": "163-173", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1030622134"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/3-540-47555-9_14"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/3-540-47555-9_14", 
      "https://app.dimensions.ai/details/publication/pub.1030622134"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-09-02T16:16", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220902/entities/gbq_results/chapter/chapter_440.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/3-540-47555-9_14"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/3-540-47555-9_14'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/3-540-47555-9_14'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/3-540-47555-9_14'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/3-540-47555-9_14'


 

This table displays all metadata directly associated to this object as RDF triples.

89 TRIPLES      22 PREDICATES      42 URIs      35 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/3-540-47555-9_14 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N3b887650d7c745fdb1b6c0691885322f
4 schema:datePublished 1993
5 schema:datePublishedReg 1993-01-01
6 schema:description In some applications of public-key cryptography it is desirable, and perhaps even necessary, that the key size be as small as possible. Moreover, the cryptosystem just needs to be secure enough so that breaking it is not cost-effective. The purpose of this paper is to investigate the security and practicality of elliptic curve cryptosystems with small key sizes of about 100 bits.
7 schema:editor Ne13d10d8ccf049b9be6e9ff0d57e9dfa
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf N59ee33b17b744227952a305970d8c0bb
11 schema:keywords applications
12 bits
13 cryptography
14 cryptosystem
15 elliptic curve cryptosystem
16 key cryptosystem
17 key length
18 key size
19 length
20 paper
21 practicality
22 public key cryptography
23 purpose
24 security
25 size
26 smaller key length
27 smaller key size
28 schema:name Public-Key Cryptosystems with Very Small Key Lengths
29 schema:pagination 163-173
30 schema:productId N03092e6f855740f897c051a88ba0ca2b
31 Nc2685d786ca047db93fa2a3287919756
32 schema:publisher N2404443465474f4481dd41132c3f1cdb
33 schema:sameAs https://app.dimensions.ai/details/publication/pub.1030622134
34 https://doi.org/10.1007/3-540-47555-9_14
35 schema:sdDatePublished 2022-09-02T16:16
36 schema:sdLicense https://scigraph.springernature.com/explorer/license/
37 schema:sdPublisher N957a5a9614564961b5a2e0f5adbcd1de
38 schema:url https://doi.org/10.1007/3-540-47555-9_14
39 sgo:license sg:explorer/license/
40 sgo:sdDataset chapters
41 rdf:type schema:Chapter
42 N03092e6f855740f897c051a88ba0ca2b schema:name doi
43 schema:value 10.1007/3-540-47555-9_14
44 rdf:type schema:PropertyValue
45 N2404443465474f4481dd41132c3f1cdb schema:name Springer Nature
46 rdf:type schema:Organisation
47 N3b887650d7c745fdb1b6c0691885322f rdf:first N4c9966ee348b4975a929ec4432c6b524
48 rdf:rest Ncfbd156dbabd4f06b9385a900662b5c1
49 N47eb6f7af45a4c68bd9d6004f4d0f025 rdf:first sg:person.010344544767.07
50 rdf:rest rdf:nil
51 N4c9966ee348b4975a929ec4432c6b524 schema:affiliation grid-institutes:grid.46078.3d
52 schema:familyName Harper
53 schema:givenName Greg
54 rdf:type schema:Person
55 N59ee33b17b744227952a305970d8c0bb schema:isbn 978-3-540-47555-2
56 978-3-540-56413-3
57 schema:name Advances in Cryptology — EUROCRYPT’ 92
58 rdf:type schema:Book
59 N71e6a7f5de904cd39691bb4c04d65684 schema:familyName Rueppel
60 schema:givenName Rainer A.
61 rdf:type schema:Person
62 N957a5a9614564961b5a2e0f5adbcd1de schema:name Springer Nature - SN SciGraph project
63 rdf:type schema:Organization
64 Nc2685d786ca047db93fa2a3287919756 schema:name dimensions_id
65 schema:value pub.1030622134
66 rdf:type schema:PropertyValue
67 Ncfbd156dbabd4f06b9385a900662b5c1 rdf:first sg:person.012711653371.43
68 rdf:rest N47eb6f7af45a4c68bd9d6004f4d0f025
69 Ne13d10d8ccf049b9be6e9ff0d57e9dfa rdf:first N71e6a7f5de904cd39691bb4c04d65684
70 rdf:rest rdf:nil
71 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
72 schema:name Information and Computing Sciences
73 rdf:type schema:DefinedTerm
74 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
75 schema:name Data Format
76 rdf:type schema:DefinedTerm
77 sg:person.010344544767.07 schema:affiliation grid-institutes:grid.46078.3d
78 schema:familyName Vanstone
79 schema:givenName Scott
80 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010344544767.07
81 rdf:type schema:Person
82 sg:person.012711653371.43 schema:affiliation grid-institutes:grid.46078.3d
83 schema:familyName Menezes
84 schema:givenName Alfred
85 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012711653371.43
86 rdf:type schema:Person
87 grid-institutes:grid.46078.3d schema:alternateName Dept. of Combinatories and Optimization, University of Waterloo, N2L 3G1, Waterloo, Ontario, Canada
88 schema:name Dept. of Combinatories and Optimization, University of Waterloo, N2L 3G1, Waterloo, Ontario, Canada
89 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...