Bilel Selikh, A. Chillali, Douadi Mihoubi, N. Ghadbane
{"title":"用两种方法求解环上的ECC [ε],ε4=0","authors":"Bilel Selikh, A. Chillali, Douadi Mihoubi, N. Ghadbane","doi":"10.32513/tmj/19322008155","DOIUrl":null,"url":null,"abstract":"Let F3d is the finite field of order 3d with d be a positive integer, we consider A4:=F3d[e]=F3d[X]/(X4) is a finite quotient ring, where e4=0. In this paper, we will show an example of encryption and decryption. Firstly, we will present the elliptic curve over this ring. In addition, we study the algorithmic properties by proposing effective implementations for representing the elements and the group law. Precisely, we give a numerical example of cryptography (encryption and decryption) by using two methods with a secret key.","PeriodicalId":43977,"journal":{"name":"Tbilisi Mathematical Journal","volume":null,"pages":null},"PeriodicalIF":0.7000,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"ECC over the ring F3d[ε],ε4=0 by using two methods\",\"authors\":\"Bilel Selikh, A. Chillali, Douadi Mihoubi, N. Ghadbane\",\"doi\":\"10.32513/tmj/19322008155\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Let F3d is the finite field of order 3d with d be a positive integer, we consider A4:=F3d[e]=F3d[X]/(X4) is a finite quotient ring, where e4=0. In this paper, we will show an example of encryption and decryption. Firstly, we will present the elliptic curve over this ring. In addition, we study the algorithmic properties by proposing effective implementations for representing the elements and the group law. Precisely, we give a numerical example of cryptography (encryption and decryption) by using two methods with a secret key.\",\"PeriodicalId\":43977,\"journal\":{\"name\":\"Tbilisi Mathematical Journal\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.7000,\"publicationDate\":\"2021-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Tbilisi Mathematical Journal\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.32513/tmj/19322008155\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"MATHEMATICS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Tbilisi Mathematical Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.32513/tmj/19322008155","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"MATHEMATICS","Score":null,"Total":0}
ECC over the ring F3d[ε],ε4=0 by using two methods
Let F3d is the finite field of order 3d with d be a positive integer, we consider A4:=F3d[e]=F3d[X]/(X4) is a finite quotient ring, where e4=0. In this paper, we will show an example of encryption and decryption. Firstly, we will present the elliptic curve over this ring. In addition, we study the algorithmic properties by proposing effective implementations for representing the elements and the group law. Precisely, we give a numerical example of cryptography (encryption and decryption) by using two methods with a secret key.