Logo des Repositoriums
 

Elliptic Curve Cryptography in X.509-based PKI

dc.contributor.authorHick, Sibylle
dc.contributor.authorLo Iacono, Luigi
dc.contributor.editorAlkassar, Ammar
dc.contributor.editorSiekmann, Jörg
dc.date.accessioned2019-04-03T13:29:08Z
dc.date.available2019-04-03T13:29:08Z
dc.date.issued2008
dc.description.abstractIn recent years a new category of digital signature algorithms based on Elliptic Curve Cryptography (ECC) has taken place besides well known schemes as RSA or DSA. So far it is, however, still not obvious how ECC-based signature schemes can be integrated in X.509-based Public Key Infrastructures (PKI).This paper briefly introduces cryptographic basics of signature schemes based on elliptic curves and points out the necessary cryptography parameters that are important in this context. Afterwards the structure and the encoding of X.509 certificates and Certificate Revocation Lists (CRL) are discussed regarding the integration of ECC public keys and ECC signatures respectively. The paper closes with exemplary implementations of ECC-based security systems.en
dc.identifier.isbn978-3-88579-222-2
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/21472
dc.language.isoen
dc.publisherGesellschaft für Informatik e. V.
dc.relation.ispartofSICHERHEIT 2008 – Sicherheit, Schutz und Zuverlässigkeit. Beiträge der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI)
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-128
dc.titleElliptic Curve Cryptography in X.509-based PKIen
dc.typeText/Conference Paper
gi.citation.endPage147
gi.citation.publisherPlaceBonn
gi.citation.startPage137
gi.conference.date2.- 4. April 2008
gi.conference.locationSaarbrücken
gi.conference.sessiontitleRegular Research Papers

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
137.pdf
Größe:
1.39 MB
Format:
Adobe Portable Document Format