| dc.contributor.author | PATRASCU, Ionel | |
| dc.contributor.author | SIMINIUC, Sergiu | |
| dc.date.accessioned | 2026-02-18T15:40:42Z | |
| dc.date.available | 2026-02-18T15:40:42Z | |
| dc.date.issued | 2025 | |
| dc.identifier.citation | PATRASCU, Ionel and Sergiu SIMINIUC. Practical cryptanalysis of ECDSA: Comparative efficiency analysis of Brute-Force and Baby-Step Giant-Step key recovery methods. In: 24th RoEduNet International Conference Networking in Education and Research, Chisinau, Republic of Moldova, 17-19 September, 2025. Universitatea Politehnică din Bucureşti. IEEE, 2025, pp. 1-5. ISBN 979-8-3315-5714-0, eISBN 979-8-331-55713-3, ISSN 2068-1038, eISSN 2247-5443. | en_US |
| dc.identifier.isbn | 979-8-3315-5714-0 | |
| dc.identifier.isbn | 979-8-331-55713-3 | |
| dc.identifier.issn | 2068-1038 | |
| dc.identifier.issn | 2247-5443 | |
| dc.identifier.uri | https://doi.org/10.1109/RoEduNet68395.2025.11208453 | |
| dc.identifier.uri | https://repository.utm.md/handle/5014/35300 | |
| dc.description | Acces full text: https://doi.org/10.1109/RoEduNet68395.2025.11208453 | en_US |
| dc.description.abstract | The Elliptic Curve Digital Signature Algorithm (ECDSA) is pivotal for securing digital information across various applications. This paper investigates ECDSA's security by focusing on two generic attack methodologies: brute-force and Baby-Step Giant-Step (BSGS). We evaluate their theoretical effectiveness and practical implications by analyzing existing research and known vulnerabilities. Our findings underscore the practical limits of ECDSA security, highlighting the critical roles of robust key generation and secure implementation practices. This work aims to provide insights for practitioners and researchers in applied cryptography, emphasizing the ongoing need for vigilance and adaptation in cryptographic security. | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | IEEE (Institute of Electrical and Electronics Engineers) | en_US |
| dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | * |
| dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
| dc.subject | cryptanalysis | en_US |
| dc.subject | brute-force attack | en_US |
| dc.subject | key recovery | en_US |
| dc.subject | elliptic curves | en_US |
| dc.title | Practical cryptanalysis of ECDSA: Comparative efficiency analysis of Brute-Force and Baby-Step Giant-Step key recovery methods | en_US |
| dc.type | Article | en_US |
The following license files are associated with this item: