短向量,GLV方法和离散对数(英文)
Short vectors,the GLV method and discrete logarithms
摘要
讨论某类短整数向量在椭圆曲线密码学中的应用,得到了GLV方法的一个加细和椭圆曲线离散对数问题的另一种解法.
Some applications of certain kinds of short vectors in elliptic curve cryptography were discussed; a refinement of the GLV method and an alternative method for the elliptic curve discrete logarithm problem were presented.
出处
《兰州大学学报(自然科学版)》
CAS
CSCD
北大核心
2009年第1期73-77,共5页
Journal of Lanzhou University(Natural Sciences)
基金
Supported by the National Program on Key Basic Research Projects(973 Program)(2007CB807903)
关键词
椭圆曲线
快速算法
离散对数
elliptic curve
fast algorithm
discrete logarithm
参考文献17
-
1KOBLITZ N. CM-curves with good cryptographic properties[J]. Advances in Cryptology-CRYPTO '91, 1992, LNCS(576): 279-287.
-
2KOBLITZ N. An elliptic curves implementation of the finite field digital signature algorithm[J]. Advances in Cryptology-CRYPTO'98, 1998, LNCS(1462): 327-337.
-
3SOLINAS J. Efficient arithmetic on Koblitz curves[J]. Designs, Codes and Cryptography, 2000, 19: 195- 249.
-
4MEIER W, STAFFELBACH O. Efficient multiplication on certain nonsupersingular elliptic curves[J]. Advances in Cryptology-CRYPTO'92, 1992, LNCS(740): 333-344.
-
5BLAKE I, MURTY V K, XU G. A note on window τ- NAF algorithm[J]. Information Processing Letters, 2005, 95(5): 496-502.
-
6BLAKE I, MURTY V K, Xu G. Efficient algorithms for Koblitz curves over fields of character- istic three[J]. Journal of Discrete Algorithm, 2005, 3: 113-124.
-
7MULLER V. Fast multiplication on elliptic curves over small fields of characteristic two[J]. Journal of Cryptology, 1998, 11: 219-234.
-
8SMART N. Elliptic curve cryptosystems over small fields of odd characteristic[J]. Journal of Cryptology, 1999, 12: 141-151.
-
9GALLANT R, LAMBERT R, VANSTONE S. Fast point multiplication on elliptic curves with efficient endomorphisms[J]. CRYPTO'01, 2001, LNCS(2139): 190-200.
-
10HANKERSON D, MENEZES A, VANSTONE S. Guide to elliptic curve cryptography[M]. New York: Springer-Verlag, 2003.
-
1陈奇峰.军事通信中重要数据的安全保护[J].信息网络安全,2009(6):16-17.
-
2裴德志,程胜利.椭圆曲线密码及其在无线网络中的应用[J].交通与计算机,2005,23(6):125-128.
-
3D.汉克森,朱尧辰.椭圆曲线密码学指导[J].国外科技新书评介,2005(2):3-4.
-
4陆正福,杨邓奇,于光德.ECC软件实现的体系结构与基础算法分析[J].昆明师范高等专科学校学报,2004,26(4):19-23. 被引量:2
-
5曹鸿钰,王鲲鹏.扭曲雅可比相交曲线上的斜-Frobenius映射[J].计算机工程,2015,41(1):270-274. 被引量:1
-
6李士达,胡玥,王兴秋,于真.一种基于ECC的SIP认证方案的提出与实现[J].计算机应用,2007,27(2):311-313. 被引量:4
-
7李安志,王维学,李方军.一种基于整数运算的消息摘要算法[J].教学与科技,2016,29(2):23-28.
-
8党焦坪,白永祥.复乘法构建椭圆曲线的一种改进[J].电脑知识与技术(过刊),2007(20):420-421.
-
9冉沛,杨吉云,谭金勇.一种新的Word电子文档完整性保护方案[J].计算机工程与应用,2013,49(13):76-79. 被引量:2
-
10罗平,邹启友.整自相似集的Hausdorff测度的上界估计[J].黔西南民族师范高等专科学校学报,2009(4):107-110. 被引量:1