期刊文献+

ECC智能卡在电子邮件安全中的应用 被引量:3

Application of ECC Smart Card in E-mail Security
下载PDF
导出
摘要 智能卡具备硬件加密的优点,且便于携带,在当今的安全领域得到广泛应用。文中介绍了智能卡的相关概念和安全特性,并根据二元有限域上的算法,在智能卡上实现了椭圆曲线密码算法。还根据该智能卡设计了一种基于混合公钥体制的电子邮件传输系统。 In view of hardware encrypting characters of easy carrying. Smart card is widely used in the security areas. Moreover, it introduces related conceptions and security characters. According to arithmetic over binary finite field, algorithms of elliptic curve cryptogrghy are implemented based on smart card. A security mail system based on smart card and hybird public-key crptogrphy are introduced in this paper.
出处 《微电子学与计算机》 CSCD 北大核心 2007年第4期85-88,共4页 Microelectronics & Computer
基金 国家部委基础科研项目(J1400B006)
关键词 智能卡 电子邮件 EC—E1Gamal 椭圆曲线密码 smart card E-mail EC-E1Gamal elliptic curve crptography
  • 相关文献

参考文献6

二级参考文献12

  • 1Wu Chengwen,J VLSI Signal Processing,1995年,10卷
  • 2Wang Clinlian,IEEE Trans Computer,1993年,42卷,9期
  • 3Hsu I S,IEEE Trans Computer,1988年,37页
  • 4P Montgomery . Modular multiplication without trialdivision. in Mathematics of Computation, Vol. 44,pp. 519-521, Apr 1985.
  • 5P. Kornerup. A systolic, linear-array multiplier for aclass of right-shift algorithms. in IEEE Transactionson computers, vol. 43, pp. 892-898, Aug 1994.
  • 6P Kornerup. High - radix modular multiplication forcryptosystems. in Computer Arithmetic, 1993. Proceedings.,11th Symposium on, pp. 277-283, Jul 1993.
  • 7Jean-Claude Bajard, Laurent-Stephane Didier, and Peter Komerup. AnRNS Montgomery modular multiplication algorithm. IEEE Transaction on Computers, 47(7):766-776,July 1998.
  • 8BruceSchneier(美)著 吴世钟 祝世雄 张文政译.应用密码学,2000,1.
  • 9Johson D, Menezes A. The Elliptic Curve Digital Signature Algorithm (ECDSA). Technical Report CORR 99 - 31, Canada Dept. Of C&O, University of Waterloo, 1999.
  • 10Menezes A, Oorachot P C V, Vanstone S. Handbook of Applied Cryp - tography, CRC Press, 1996:425 -460.

共引文献10

同被引文献15

  • 1杨孝光.ECC校验的算法分析和程序实现[J].实验科学与技术,2004,2(3):13-16. 被引量:15
  • 2汪宇光.CPK认证体制的技术特点及应用[J].电子科学技术评论,2005(2):5-10. 被引量:17
  • 3Chen Zhiqun. Java card technology for smart cards: architecture and programmer's guide[M]. Boston: AddisonWesley Longman Publishing Co. Inc. , 2000.
  • 4Chien L H. Security of two remote user authentication schemes using smart cards[J].IEEE Trans. on Consumer Electronics, 2003,49(4) : 1196 - 1198.
  • 5南湘浩.CPK标识认证[M].北京:国防工业出版社,2005:50-62.
  • 6南相浩,唐文.ECC组合公钥[C]//中国计算机学会信息保密专业委员会论文集.北京:中国科学技术大学出版社,2001,11(9):341-347.
  • 7潘松,黄继业.EDA技术与VHDL[M].3版.北京:清华大学出版社,2010:182-210.
  • 8LRVIN D R. Cyclic redundancy checks with factorable generator[ J]. IEEE Proceedings Communications,2003,150 ( 1 ) :17-20.
  • 9WANG X Y,YU H B,YIN Y. Efficient collision search attacjs on SHA-0 [ EB/OL]. [ 2012-05-15 ]. http ://www. iacr. org/archive/crypto2005/ 36210001/36210001. pdf.
  • 10WELLS R B. Applied coding and informatoin theory for enginrres [ M ]. 1st ed. Beijing:China Machine Press ,2003 :135-148.

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部