期刊文献+

椭圆曲线加密体制的有限域求模逆算法的改进 被引量:1

Improvement of Modular Inverse Algorithm on Finite Fields For Elliptic Curve Cryptosystem
下载PDF
导出
摘要 本文在整数的扩展欧几里德算法基础上,对椭圆曲线加密体制的有限域求模逆算法作出改进,不仅有效提高了运算速度,使之同时兼容二进制域和素数域,同时也利于硬件实现. This paper improve a modular inverse algorithm on finite fields for Elliptic curve cryptosystem,that is built on Extended Euclid algorithm.The new algorithm not only runs faster than the old ones,but it can be used in two kinds of finite fields,which are Galois fields GF(p) and GF(2m).Furthermore more,it provides a great convenience for hardware realization.
出处 《中央民族大学学报(自然科学版)》 2009年第S1期143-146,共4页 Journal of Minzu University of China(Natural Sciences Edition)
基金 国家自然科学基金(No.10871200) 中央民族大学"211"工程项目(No.021211030312)资助
关键词 有限域 椭圆曲线加密算法 求模逆算法 Finite fields ECC modular inverse
  • 相关文献

参考文献2

二级参考文献17

  • 1陈运,龚耀寰.RSA快速算法研究[J].信息安全与通信保密,2000,22(3):43-46. 被引量:4
  • 2Koblitz N. Elliptic curve cryptosystems. Mathematics of Computation, 1987, 48(177) : 203-209
  • 3Miller V S. Use of elliptic curve in cryptography // Advances in Cryptology CRYPTO 1985. New York: Springer-Verlag, 1985:417-426
  • 4Rivest R L, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1987, 21(2): 120-126
  • 5Cilardo A, Coppolino L, Mazzocca N, et al. Elliptic curve cryptography engineering// Proceedings of the IEEE, Feb. 2006, 94(2): 395-406
  • 6Hankerson D, Menezes A, Vanstone S. Guide to Elliptic Curve Cryptography. New York : Springer-Verlag, 2005
  • 7Satoh A, Takano K. A Scalable dual-field elliptic curve eryptographic processor. IEEE Transactions on Computers, 2003, 52(4): 449-460
  • 8Crowe F, Daly A, Marnane W. A Scalable dual mode arithmetic unit for public key cryptosystems. IEEE Coding and Computing (ITCC'05), 2005, 1:567-573
  • 9Burnner H, Curiger A, Hofstetter M. On computing multiplicative inverses in GF (2^m). IEEE Trans on Computers, 1995, 42(8): 1010-1015
  • 10Dinh A V, Bohon R J, architecture for computing Mason R. A low latency muhiplicative inverses and divisions in GF (2^m). IEEE Trans: Analog and Digital Signal Processing, 2001, 48(8): 789-793

共引文献12

同被引文献6

  • 1谭丽娟,陈运.模逆算法的分析、改进及测试[J].电子科技大学学报,2004,33(4):383-386. 被引量:10
  • 2IEEE Std.P1363-2000,Standards Specifications for Public-Key Cryptography,Annex A-Number-Theoretic Background[O/L].2000.http://grouper.ieee.org/groups/1363/.
  • 3Mullin R C,Onyszchuk I,Vanstone S A,et al.Optimal nor-mal bases in GF(pn)[J].Dise Appl Math,1988/1989,22:149.
  • 4Schroepel R,Orman H,Malley S O’,et al.Fask key ex-change with elliptic curve systems,advances in cryptology[C]∥Proc Crypto’95 LNCS963,Springer-Verlag,1995:43-56.
  • 5Kaliski B S.The montgomery inverse and its applications[J].IEEE Trans on Comp,1995,44(8):1064.
  • 6王健,蒋安平,盛世敏.椭圆曲线加密体制的双有限域算法及其FPGA实现[J].北京大学学报(自然科学版),2008,44(6):871-876. 被引量:5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部