期刊文献+

椭圆曲线密码体制及其在智能卡上的应用 被引量:1

Elliptic curves cryptosystems and it's application in smart card
下载PDF
导出
摘要 近年来椭圆曲线密码体制研究已经成为一个热点,椭圆曲线密码体制从安全性和有效性来看具有广阔的应用前景。介绍了椭圆曲线的基本知识、椭圆曲线上的密码体制及其在智能卡方面的应用,并分析了安全椭圆曲线的几种构造方法,实现了特征2的有限域上安全椭圆曲线的构造。 Recently, elliptic curves cryptosystems have broad application in security and efficiency, and elliptic curves cryptosystems have become a focus of research. Elliptic curves, elliptic curves cryptosystems and the cryptosystems application in smart card were introduced. Some methods of construction of security elliptic curves were introduced and gives the implementation of construction of security elliptic curves over finite field with characteristic 2 was given.
出处 《计算机工程与设计》 CSCD 北大核心 2005年第9期2555-2557,2560,共4页 Computer Engineering and Design
关键词 椭圆曲线 密码体制 离散对数 智能卡 Satoh算法 elliptic curve cryptosystem discrete logarithm smart card satoh algorithm
  • 相关文献

参考文献8

  • 1Diffie W, Hellman M E. New directions in cryptography[J].IEEE Trans Informat Theory, 1976,(22):644-654.
  • 2Rivest R, Shamir L A, Adleman L. A method for obtaining digital signatures and public-key cryptosystem[J].Comm, ACM,1978,21(2):120-126.
  • 3Elgamal L.A public key cryptosystem and signature scheme base on discrete logarithm [J]. IEEE Trans of information Theory,1985, 31:469-472.
  • 4Miller V. Use of elliptic curves in cryptography [C]. In A M Odlyzko, Advances in Cryptology-Proceedings of CRYPTO,1986,263:417-426.
  • 5Koblitz N. Elliptic curve cryptosystems [J]. Mathematics of Compution, 1987,48:203-309.
  • 6Joseph H Silberman. The arithmetic of elliptic curves[M]. New York:Springer-Verlag, 1986.46-61,130-136.
  • 7Satoh T. The canonical lift of an ordinary elliptic curve over a finite field and its point counting [J]. Ramanujan Mathematical Society, 2000,15:247-270.
  • 8Fouquet M, Gaudry P, Harley R. An extention Satoh'algorithm and its implementation [J]. Ramanujan Mathematical Society,2000,15:281-318.

同被引文献8

  • 1林品,李大兴.基于椭圆曲线的代理签名和门限代理签名体制[J].计算机工程与设计,2004,25(5):665-667. 被引量:5
  • 2张庆胜,叶震,周兵斌,李志亮,管水能.椭圆曲线加密算法在PKI中的应用[J].计算机工程与设计,2004,25(7):1229-1231. 被引量:7
  • 3Miller V.Use of elliptic curve in cryptography[C].New York:Proceddings of CRYPTO' 85,Spinger Verlag,1985.
  • 4Koblitx N.Elliptic curve cryptosystem[M].New.York:Spinger Verlag,1987.
  • 5IEEE P1363/D9.Standard specification for public key cryptography[S].1999.
  • 6Pohlig SC Hellman ME.An improved algorithm for computing logarithms over GF (p) and its cryptographic significance[J].IEEE Trans inform Theoty,1978,24:106-110.
  • 7Menezes A,Olamoto T,Vanstone S.Reducing elliptic curve logarithms to logarithms in finite fields[J].IEEETIT,1993,39 (5):1639-1646.
  • 8Blundo C,De Santis A,Stinson D R.On the contrast in visual cryptography schemes[J].Journal of Cryptology,1999,12:261-289.

引证文献1

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部