Elliptic curves cryptography for lightweight devices in IoT systems

Descripción del Articulo

El texto completo de este trabajo no está disponible en el Repositorio Académico UPN por restricciones de la casa editorial donde ha sido publicado.
Detalles Bibliográficos
Autores: Simon Francia, Ana, Solis Lastra, Javier, Papa Quiroz, Erik Alex
Formato: objeto de conferencia
Fecha de Publicación:2022
Institución:Universidad Privada del Norte
Repositorio:UPN-Institucional
Lenguaje:inglés
OAI Identifier:oai:repositorio.upn.edu.pe:11537/30270
Enlace del recurso:https://hdl.handle.net/11537/30270
https://doi.org/10.1007/978-3-030-96043-8_6
Nivel de acceso:acceso cerrado
Materia:Criptografía
Seguridad de datos
Criptografía de curva elíptica
Controles de acceso
Software de aplicación
https://purl.org/pe-repo/ocde/ford#2.02.04
id UUPN_6d69b7fc28136bc8c8daec813c00f20d
oai_identifier_str oai:repositorio.upn.edu.pe:11537/30270
network_acronym_str UUPN
network_name_str UPN-Institucional
repository_id_str 1873
dc.title.es_PE.fl_str_mv Elliptic curves cryptography for lightweight devices in IoT systems
title Elliptic curves cryptography for lightweight devices in IoT systems
spellingShingle Elliptic curves cryptography for lightweight devices in IoT systems
Simon Francia, Ana
Criptografía
Seguridad de datos
Criptografía de curva elíptica
Controles de acceso
Software de aplicación
https://purl.org/pe-repo/ocde/ford#2.02.04
title_short Elliptic curves cryptography for lightweight devices in IoT systems
title_full Elliptic curves cryptography for lightweight devices in IoT systems
title_fullStr Elliptic curves cryptography for lightweight devices in IoT systems
title_full_unstemmed Elliptic curves cryptography for lightweight devices in IoT systems
title_sort Elliptic curves cryptography for lightweight devices in IoT systems
author Simon Francia, Ana
author_facet Simon Francia, Ana
Solis Lastra, Javier
Papa Quiroz, Erik Alex
author_role author
author2 Solis Lastra, Javier
Papa Quiroz, Erik Alex
author2_role author
author
dc.contributor.author.fl_str_mv Simon Francia, Ana
Solis Lastra, Javier
Papa Quiroz, Erik Alex
dc.subject.es_PE.fl_str_mv Criptografía
Seguridad de datos
Criptografía de curva elíptica
Controles de acceso
Software de aplicación
topic Criptografía
Seguridad de datos
Criptografía de curva elíptica
Controles de acceso
Software de aplicación
https://purl.org/pe-repo/ocde/ford#2.02.04
dc.subject.ocde.es_PE.fl_str_mv https://purl.org/pe-repo/ocde/ford#2.02.04
description El texto completo de este trabajo no está disponible en el Repositorio Académico UPN por restricciones de la casa editorial donde ha sido publicado.
publishDate 2022
dc.date.accessioned.none.fl_str_mv 2022-05-09T17:06:04Z
dc.date.available.none.fl_str_mv 2022-05-09T17:06:04Z
dc.date.issued.fl_str_mv 2022-02-03
dc.type.es_PE.fl_str_mv info:eu-repo/semantics/conferenceObject
format conferenceObject
dc.identifier.citation.es_PE.fl_str_mv Simon, A., Solis, J., & Papa, E. (2022). Elliptic curves cryptography for lightweight devices in IoT systems. Lecture Notes in Networks and Systems, 405. https://doi.org/10.1007/978-3-030-96043-8_6
dc.identifier.uri.none.fl_str_mv https://hdl.handle.net/11537/30270
dc.identifier.journal.es_PE.fl_str_mv Lecture Notes in Networks and Systems
dc.identifier.doi.none.fl_str_mv https://doi.org/10.1007/978-3-030-96043-8_6
identifier_str_mv Simon, A., Solis, J., & Papa, E. (2022). Elliptic curves cryptography for lightweight devices in IoT systems. Lecture Notes in Networks and Systems, 405. https://doi.org/10.1007/978-3-030-96043-8_6
Lecture Notes in Networks and Systems
url https://hdl.handle.net/11537/30270
https://doi.org/10.1007/978-3-030-96043-8_6
dc.language.iso.es_PE.fl_str_mv eng
language eng
dc.rights.es_PE.fl_str_mv info:eu-repo/semantics/closedAccess
eu_rights_str_mv closedAccess
dc.format.es_PE.fl_str_mv application/pdf
dc.publisher.es_PE.fl_str_mv Springer
dc.publisher.country.es_PE.fl_str_mv CH
dc.source.es_PE.fl_str_mv Universidad Privada del Norte
Repositorio Institucional - UPN
dc.source.none.fl_str_mv reponame:UPN-Institucional
instname:Universidad Privada del Norte
instacron:UPN
instname_str Universidad Privada del Norte
instacron_str UPN
institution UPN
reponame_str UPN-Institucional
collection UPN-Institucional
bitstream.url.fl_str_mv https://repositorio.upn.edu.pe/bitstream/11537/30270/1/license.txt
bitstream.checksum.fl_str_mv 8a4605be74aa9ea9d79846c1fba20a33
bitstream.checksumAlgorithm.fl_str_mv MD5
repository.name.fl_str_mv Repositorio Institucional UPN
repository.mail.fl_str_mv jordan.rivero@upn.edu.pe
_version_ 1752944145551327232
spelling Simon Francia, AnaSolis Lastra, JavierPapa Quiroz, Erik Alex2022-05-09T17:06:04Z2022-05-09T17:06:04Z2022-02-03Simon, A., Solis, J., & Papa, E. (2022). Elliptic curves cryptography for lightweight devices in IoT systems. Lecture Notes in Networks and Systems, 405. https://doi.org/10.1007/978-3-030-96043-8_6https://hdl.handle.net/11537/30270Lecture Notes in Networks and Systemshttps://doi.org/10.1007/978-3-030-96043-8_6El texto completo de este trabajo no está disponible en el Repositorio Académico UPN por restricciones de la casa editorial donde ha sido publicado.To protect data confidentiality, cryptographic methods are widely used, however, traditional methods require a higher level of computational resources to achieve a higher level of security. For this reason, ECC (Elliptic Curves Cryptography) is considered as a promising solution. This paper shows a systematic review about ECC methods for IoT systems. Our research questions were related to find out the principal applications of ECC, criteria for implementing ECC and the appropriate elliptic curves for lightweight devices. The papers were collected from Scopus, Science Direct and SpringerLink and after doing the study, we conclude that IoT is the principal application of ECC, the processing time is the most common implementation criteria and the Koblitz elliptic curve over prime fields are accurate for IoT.Revisión por paresComasapplication/pdfengSpringerCHinfo:eu-repo/semantics/closedAccessUniversidad Privada del NorteRepositorio Institucional - UPNreponame:UPN-Institucionalinstname:Universidad Privada del Norteinstacron:UPNCriptografíaSeguridad de datosCriptografía de curva elípticaControles de accesoSoftware de aplicaciónhttps://purl.org/pe-repo/ocde/ford#2.02.04Elliptic curves cryptography for lightweight devices in IoT systemsinfo:eu-repo/semantics/conferenceObjectLICENSElicense.txtlicense.txttext/plain; charset=utf-81748https://repositorio.upn.edu.pe/bitstream/11537/30270/1/license.txt8a4605be74aa9ea9d79846c1fba20a33MD5111537/30270oai:repositorio.upn.edu.pe:11537/302702022-05-09 12:07:24.69Repositorio Institucional UPNjordan.rivero@upn.edu.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
score 13.95948
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).