期刊文献+

F2^n上基于ONB的椭圆曲线乘法器的设计与实现 被引量:2

The Design and Implementation of an Elliptic Curve Multiplier Based on ONB in F2^n
下载PDF
导出
摘要 文章在介绍有限域运算法则,域上椭圆曲线及点的运算法则的基础上,设计了一个F1291上基于优化正规基的串行椭圆曲线乘法器,其点乘运算速度可达80.87次/秒,为进一步完成椭圆曲线加密系统提供了硬件基础。 A serial elliptic curve multiplier based on optimal normal basis in F2^n is carried out in the paper, through introduction of operation rules in Galois Field, elliptic curves and point operation rules. The rate of point multiply is about 80.87 per second. A well hardware basis for the completion of an elliptic curve cryptosystem is provided by the paper.
出处 《微电子学与计算机》 CSCD 北大核心 2005年第7期184-188,共5页 Microelectronics & Computer
关键词 椭圆曲线 正规基 点加运算 点倍运算 Elliptic Curve, Optimal Normal Base, Point Add Operation, Point Double Operation
  • 相关文献

参考文献10

  • 1N Koblitz. Elliptic Curve Cryptosystems. Mathematics of Computation. 1987, 48: 203-208.
  • 2V S Miller. Use of Elliptic Curves in Cryptography. In CRYPTO'85, 1986: 417-426.
  • 3T E1Gamal. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. Advances in Cryptology-Proceedings of CRYPTO'84, Springer Verlag Lecture Notes in Computer Science, 1985: 10-18.
  • 4Ceiticom Corporation Whitepaper. Canada: Certicom Corporation, 1997.
  • 5Agnew G B, Mullin R C, Vanstone S A. An Implementation of Elliptic Curve Cryptosysytems Over. IEEE Journal on Selected Areas, 1993, 11(5): 804-813.
  • 6J Guajardo, C Paar. Elliptic Algorithms for Elliptic Curve Cryptosystems. In Advances in Cryptography-CRYPTO'97,Springer-Verlag, 1997: 342-356.
  • 7IEEE P1363. Standart Specifications for Public Key Cryptography Draft Version 13, 1999.
  • 8Sang ho oh, Chang Han Kim. Algorithm of Inverse Operation in GF(2'). IEEE Transactions on Information Theory,1998.
  • 9T Itoh, S Tsujii. A Fast Algorithm for Computing Multiplicative Inverses in GF(2'). Using Normal Bases Information And Computation, 1988, 78(3): 171-177.
  • 10Zhou H H. Research on the Architecture and Implementation of block cipher algorithm (ECC and IDEA) [D]. EE Dept of Fudan Univ, China, 2000.

同被引文献15

  • 1张宁,牛志华,肖国镇.基于域GF(2^m)上的椭圆曲线中标量乘的快速算法[J].计算机科学,2006,33(1):64-65. 被引量:3
  • 2英海燕,王友波,韩月秋.基于FPGA椭圆曲线密码体制的研究[J].计算机工程与设计,2006,27(5):752-755. 被引量:4
  • 3吴永一,李庆,曾晓洋.具有防御功耗攻击性能的双域椭圆曲线密码处理器设计[J].小型微型计算机系统,2006,27(12):2321-2325. 被引量:3
  • 4Koblitz N.Elliptic Curve Cryptosystems[J].Mathematics of Computation,1987,48(177):203-209.
  • 5Miller V S.Use of Elliptic Curves in Cryptography[C]//Advances in Crypto'85.1985:417-426.
  • 6Agnew G B,Mullin R C,Vanstone S A.An Implementation of Elliptic Curve Cryptosystems over[J].IEEE Journal on Selected Areas in Communications,1993,11(5):804-813.
  • 7Menezes A J.Elliptic Curve Public Key Cryptosystems[M].Kluwer Academic Publishers,1993.
  • 8Itoh T,Tsujii S.A Fast Algorithm for Computing Multiplicative Inverses in GF(2n) Using Normal Bases[J].Information and Computation,1988,78(3):171-177.
  • 9IEEE P1363 Standart Specifications for Public Key Cryptography (Draft Version 13)[S].1999.
  • 10Sang H O,Chang Han Kim.Algorithm of Inverse Operation in GF(2n)[EB/OL].1998.http://citeseer.ist.psu.edu/133343.html.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部