期刊文献+

基于FPGA的GF(2^m)域求逆算法的设计研究 被引量:2

Research on FPGA Implementation of Algorithm for Computing Inverse in GF(2^m)
下载PDF
导出
摘要 有限域GF(2m)上的椭圆曲线密码体制以其密钥短、安全强度高的优点获得了广泛的重视和应用,该密码体制域运算中最费时的运算是有限域上的求逆运算。论文提出一种基于多项式基乘法和平方的FPGA快速求逆设计方法,并给出了面积与速度的比较分析。 The elliptic curve cryptosystems in the finite field GF(2^m) receive considerable attention and are widely used because of their small key size and high security,Inverse over the finite field GF(2^m) is the most time consumed arithmetic operation.This paper presents an efficient FPGA implementation for the algorithm for computing inverse based on polynomial basis multiplier and square,and the tradeoff analysis of the inverse with respect to area and performance is also provided.
出处 《计算机工程与应用》 CSCD 北大核心 2006年第9期135-137,共3页 Computer Engineering and Applications
基金 北京电子科技学院科研基金资助项目(编号:YZG0310)
关键词 有限域 求逆算法(FPGA) CYCLONE VHDL finite field, inverse, Cyclone, VHDL
  • 相关文献

参考文献4

  • 1Aneel Murari.Software Implementations of Elliptic Curve Cryptography[M].2003
  • 2Nghi Nguyen,Kris Gaj,David Caliga et al.Implementation of Elliptic Curve Cryptosystems on a Reconfigurable computer.FTP2003
  • 3Jonathan Lutz.High Performance Elliptic Curve Cryptographic Co_Processor.Waterloo,Canada,2003
  • 4高献伟,靳济方,方勇,李为民.GF(2^m)域乘法器的快速设计及FPGA实现[J].计算机工程与应用,2004,40(25):111-112. 被引量:9

二级参考文献1

  • 1Altera的HardCopyStratix瞄准ASIC市场[J]电子产品世界,2003(13).

共引文献8

同被引文献13

  • 1蔡振国,陈韬,郁滨.基于GF(2^n)的ECC乘法逆元的快速实现[J].微处理机,2006,27(3):59-62. 被引量:1
  • 2鲍可进,宋永刚.基于FPGA的有限域求逆算法的改进及实现[J].计算机工程,2006,32(23):156-158. 被引量:4
  • 3Koblitz N. Elliptic Curve Cryptosystems[J]. Mathematics of Computation, 1987, 48(177): 203-209.
  • 4Miller V S. Use of Elliptic Curves in Cryptography[C]//Proc. of CRYPTO'85. New York, USA: Springer-Verlag, 1986: 417-426.
  • 5IEEE. P1363-2000 Standard Specifications for Public Key Cryptography[S]. 2000.
  • 6Bailey D V, Paar C. Efficient Arithmetic in Finite Field Extensions with Application in Elliptic Curve Cryptography[J]. Journal of Cryptology, 2001, 14(3): 153-176.
  • 7W.DIFFIE H M. New direction in cryptography [J].IEEE Tran-sactions on information Theory, 1976,22(6) : 644-654.
  • 8HANKERSON Darrel, MENEZES Alfred, VANSTONE Scott.,Guide to Elliptic Curve Cryptography[M].张焕闻,译.北京:电子工业出版社,2005.
  • 9BKOWN M,HANKERSON D, LOPEZ J,et al. Software im-plementation of the NIST elliptic curves over prime fields [C]//Topics in Cryptology-CT-RSA. [S.l.]: Springer, 2002: 250-265.
  • 10SEHROEPPEL K, ORMAN H,O'MALLEY S,et al. Fast keyexchange with elliptic curve systems |C]// Advances in Cryptolo-gy-CRYPTO. [S.l.]: [s.n.], 1995: 43-56.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部