期刊文献+

RSA算法的硬件实现 被引量:2

Hardware Realization of RSA Algorithm
下载PDF
导出
摘要 随着计算机和Internet技术的飞速发展,数据在传输过程中的安全性越来越受到重视。对数据进行加密处理成为一种最有效的方法。RSA加密算法是一种值得信赖的算法,但速度太慢是其缺点,而用硬件方法实现恰好可以克服这个缺点。本文主要介绍了RSA算法的硬件实现。 With the rapid development of computer and Internet technology, we pay more and more attention to the security of data in the transferring process. As a result, data encryption becomes one of the most effective ways. RSA encryption algorithm is a believable algorithm except for its slow speed. However hardware method can overcome this problem. This paper focuses on the realization of RSA algorithm by hardware method.
出处 《仪器仪表学报》 EI CAS CSCD 北大核心 2003年第z2期313-316,共4页 Chinese Journal of Scientific Instrument
关键词 加密/解密 硬件实现 Public key Encrypt/decrypt Algorithm Hardware realization
  • 相关文献

参考文献3

二级参考文献2

  • 1卢起骏,计算机网络保密系统设计与实现指南,1987年
  • 2陈景润,初等数论,1978年

共引文献3

同被引文献21

  • 1袁莉芬,刘韬,何怡刚,张鹤鸣,束海星.基于LSA-MP改进原子分解的电能质量数据压缩方法[J].电子测量与仪器学报,2022,36(1):98-108. 被引量:5
  • 2KOBLITZ N. Elliptic curve cryptosystems [ J ]. Mathematics of Computation, 1987,48(177) :203-208.
  • 3MILLER V S. Use of elliptic curves in cryptosystems [ J]. Advances in Crypto'55. Lecture Notes in Computer Science. Spring-Verlag Berlin, 1985:417426.
  • 4CIET M, JOYE M, LAUTER K. Trading inversions for multiplications in elliptic curve cryptography [ J ]. Designs, Codes and Cryptography, 2006,39 (2) : 189-20.
  • 5SAKAI Y, SAKURAI K. Efficient scalar multiplications on elliptic curves with direct computer actions of several doublings[ J ]. IEICE Trans on Fundamentals, 2001.
  • 6HANKERSON D, HERNANDEZ J L, MENEZESA. Software implementation of elliptic curve cryptography over binary[ C ]. Proc of the 2nd International Workshop on Cryptographic Hardware and Embedded Systems. London : Springer Verlag, 1999 : 1-2.
  • 7AYDOS M, YANIK T, KOC C K. High-speed imple- mentation of an ECC-based wireless authentication proto- col on an ARM micro-processor [ J ]. IEEE Proceedings on Communications, 2001,148(5 ) :273-279.
  • 8HANKERSON D, MENEZES A, VANSTONE S 著,张焕国译.椭圆曲线加密算法导论[M].北京:电子工业出版社,2005:45-46,74-76,91-92.
  • 9杨先文,李峥.基于GF(2^n)上椭圆曲线标量乘的快速实现[J].计算机工程,2007,33(24):175-176. 被引量:2
  • 10王健,蒋安平,盛世敏.椭圆曲线加密体制的双有限域算法及其FPGA实现[J].北京大学学报(自然科学版),2008,44(6):871-876. 被引量:5

引证文献2

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部