期刊文献+

有限域GF(2^m)上椭圆曲线密码体制的运算分析及NTL实现 被引量:4

Arithmetic Analysis and Implementation with NTL on Elliptic Curve Cryptosystem Over Finite Field GF(2m)
下载PDF
导出
摘要 椭圆曲线密码体制主要是基于有限域GF(p)和GF(2m)上建立的,建立在GF(2m)的椭圆曲线密码体制的运算可以用比特流来实现,因而其效率更高。本文详细分析了有限域GF(2m)和椭圆曲线群上的两层运算;讨论了由美国纽约大学的VictorShoup(国际标准ISO18033-2的编写人)开发并维护的C++开放源代码的数论算法库NTL,并用NTL实现了其中的关键运算,编程测试结果良好。 Elliptic curve cryptosystem is built up base on finite field GF(p) and GF(2m).Arithmetics of Elliptic curve cryptosystem over GF(2m) can be implemented using bit string,therefore it’s efficiency of implementation is more higher.This paper analyses two layer arithmetic of finite field GF(2m) and elliptic curve group in detail,and discuss NTL(Numbery Theory Library) with open C++ source which is written and maintained by Victor Shoup,New York University,writer of ISO 18033-2.Here we use NTL library to implement the key arithmetics.Program testing shows the results are good.
作者 彭长根 李祥
出处 《贵州大学学报(自然科学版)》 2005年第1期1-6,共6页 Journal of Guizhou University:Natural Sciences
关键词 有限域 比特流 GF(2^m) 椭圆曲线密码体制 NTL finite field bit string GF(2~m) elliptic curve cryptosystem NTL
  • 相关文献

参考文献9

  • 1刘胜利,郑东,王育民.域GF(2~n)上安全椭圆曲线及基点的选取[J].电子科学学刊,2000,22(5):824-830. 被引量:6
  • 2IEEE P1363. Part4:Elliptie Curve System. November 6 1995.
  • 3V. Shoup. A Tour of NTL. http://www.shoup. net/.
  • 4Online Elliptic Curve Cryptography Tutorial. http ://www. certicom. com/.
  • 5V. Kislenkov. V. Mitrofanov. Eugene V. Zima. How fast can we comoute oroducts. ISSAC 1999:75 -82.
  • 6A. Bostan, G. Leccrf, E. Schost. Tellegen' s Principle into Practice. ISSAC' 03,37 - 44.
  • 7Neal Koblitz. A Course Number Theory and Cryptography, Spring-Verlag. pages 150 - 160,1987.
  • 8Makoto Matsumoto,Shkgehiro Tagami. Practical fast algorithm for finite field arithmetics using group tings. Hiroshima Math.,J.34(2004) ,201 -210.
  • 9李湛.一种改进的椭圆曲线密码实现算法[J].电子科技,2004,17(7):31-33. 被引量:13

共引文献17

同被引文献24

  • 1张金山.用分布式并行算法选取GF〔p〕上椭圆曲线的基点[J].计算机仿真,2004,21(4):54-55. 被引量:3
  • 2彭长根,李祥.基于NTL算法库的椭圆曲线密码模逆与点乘运算[J].信息安全与通信保密,2005,27(7):116-118. 被引量:1
  • 3张仁平,彭长根.素域F_p上的安全椭圆曲线的选取及基点快速算法的研究[J].信息安全与通信保密,2007,29(8):33-35. 被引量:1
  • 4Von ZUR GATHEN J , GERHARD J . Modem computer algebra [ M]. New York: Cambridge University Press, 1999.
  • 5BERNARDIN L, MONAGAN M B. Efficient multivariate factorization over finite fields [ C]// Proceedings of the 12th International Symposium on Applied Algebra, Algebraic Algorithms and Error- Correcting Codes, LNCS 1255. Berlin: Springer-Verlag, 1997:15 - 28.
  • 6KONSTANTINOU E , STAMATIOU Y C , ZAROLIAGIS C D . A software library for elliptic curve cryptography algorithm [ C]// Proceedings of the 10th Annual European Symposium on Algorithms (ESA 2002), LNCS 2461. Berlin: Springer-Verlag, 2002: 101- 130.
  • 7LECERF G. Improved dense multivariate polynomial factorization algorithms[ J]. Journal of Symbolic Computation, 2007, 42(4) : 477 - 494.
  • 8A tour of NTL [ EB/OL]. [ 2007 - 10 - 10]. http://shoup, net/ ntl/doe/tour, html.
  • 9SYNAPS (SYmbolic Numeric ApplicationS) [ EB/OL]. [ 2007 -10 -05]. http://www-sop. inria. fr/galaad/synaps/.
  • 10STROUSTRUP B. The C + + programming language [ M]. 3rd ed. [ S. l. ] : Addison-Wesley Professional, 2000.

引证文献4

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部