期刊文献+

REESSE 2公开密钥密码体制 被引量:2

The REESSE 2 Public Key Cryptosystem
下载PDF
导出
摘要 作者综合利用超递增序列、杠杆函数和HASH函数的特性提出了能有效地抵御"极小点"攻击和"LOB-L3归约基"攻击的REESSE2公开密钥密码体制,详细描述了该体制的数学基础、密钥生成算法、加密算法和解密算法。文章对REESSE2体制的安全性和优越性做了分析,并归纳了提高公钥密码体制安全性的两条途径。 On the basis of the super increasing sequence ,lever function and HASH function ,the authors put forward the REESSE2 public key cryptosystem which can defend efficiently attacks by the extreme small dot and LOB-L^3 reduced base,expound the math foundation and three algorithms for generating-key,encryption and decryption of the crytosystem,analyze algorithmic security and advantage,and induce the two approaches to enhancing securities of public key crytosystems.
出处 《计算机科学》 CSCD 北大核心 2004年第9期148-151,共4页 Computer Science
关键词 公开密钥密码体制 生成算法 加密算法 HASH函数 解密算法 攻击 公钥密码体制 安全性 数学基础 序列 Lever function Super increasing sequence Redundancy encryption Public key crytosystem
  • 相关文献

参考文献3

二级参考文献1

  • 1BruceSchneier 吴世忠译.Applied Cryptography[M].北京:机械工业出版社,2000..

共引文献6

同被引文献17

  • 1苏盛辉,杨义先,杨炳儒.REESSE1加密方案中杠杆函数的充分必要性分析[J].电子学报,2006,34(10):1892-1895. 被引量:1
  • 2温晓军,刘云.一种可实现的量子有序多重数字签名方案[J].电子学报,2007,35(6):1079-1083. 被引量:19
  • 3T Moh. On Tame Transformation Method (TIM) [OL]. http://www, usdsi, com/lctr, ps, 1999.
  • 4Jiun-ming Chen, Bo-yin Yang. Tame transformation signatures with topsy-turvy hashes [ A ]. Proc. of the IWAP ' 02 [C]. Taipei, 2002.
  • 5R L Rivest, A Shamir, L M Adleman. A method for obtaining digital signatures and public-key cryptosystems[J]. Communications of the ACM, 1978,21(2) : 120 - 126.
  • 6T ElGamal.A public-key cryptosystem and a signature scheme based on discrete logarithms [J]. IEEE Transactions on Informarion Theory, 1985,31(4) :469 - 472.
  • 7Henri Cohen. A Course in Computational Algebraic Number Theory[M]. Berlin: Springer-Verlag, 2000, ch. 1,3.
  • 8A J Menezes,P Van Oorschot,S Vanstone. Handbook of Applied Cryptography[ M]. London: CRC Press, 1997, ch. 4,9.
  • 9Paul Garrett. Making, Breaking Codes: An Introduction to Cryptology [M]. New Jersey: Prentice-Hall, 2001, ch. 12.
  • 10Shenghui Su, Shuwang Lii. To Solve the High Dcgrcc Congruence x^n = a (rood p ) in GF(p ) [ A ]. The Proceedings of 2007 International Conference on the Computational Intelligence and Security[ C]. IEEE Computer Society Press, Dec, 2007. 672 - 676.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部