Elliptic curve cryptography on a palm os device

17Citations
Citations of this article
27Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The market for Personal Digital Assistants (PDA) is growing rapidly and PDAs are becoming increasingly interesting for commercial transactions. One requirement for further growing of eCommerce with mobile devices is the provision of security. We implemented elliptic curves over binary fields on a Palm OS device. We chose the NIST recommended random and Koblitz curves over GF(2163) that are providing a sufficient level of security for most commercial applications. Using Koblitz curves a typical security protocol like Diffie-Hellman key exchange or ECDSA signature verification requires less than 2. 4 seconds, while ECDSA signature generation can be done in less than 0. 9 seconds. This should be tolerated by most users.

Cite

CITATION STYLE

APA

Weimerskirch, A., Paar, C., & Shantz, S. C. (2001). Elliptic curve cryptography on a palm os device. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2119, pp. 502–513). Springer Verlag. https://doi.org/10.1007/3-540-47719-5_39

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free