期刊文献+

F2上安全的Edwards曲线 被引量:2

Secure Edwards Curves over F2
原文传递
导出
摘要 Edwards曲线提供了大量的可以抵挡旁道攻击的椭圆曲线,因此引起了人们特别的关注。最近Bernstein、Lange和Farashahi将一般的Edwards曲线推广到了特征为2的域上,并认为这类椭圆曲线必将会有广泛的应用。但是这类曲线的安全性却仍然是一个值得商榷的问题。文中通过双有理等价映射讨论了F2上的Edwards曲线与Koblitz曲线之间的关系,并由此推出这类Edwards曲线会在一些扩域上具有安全性。 The invention of Edwards curves has attracted much attention from the cryptologists, because they provide a large amount of elliptic curves which are possible to resist the side-channel attack. Recently, Bemstein, Lange and Farashahi generalize Edwards curves to binary field and recommend their wide applications. However, the security of these curves is open to question. In this paper the relation between an ordinary Edwards curve over F2 and one kind of Koblitz curve is discussed, in virtue of the birationally equivalence map, and form this, it is deduced that this Edwards curve is secure in some extension fields.
作者 李静 彭国华
出处 《信息安全与通信保密》 2009年第8期293-296,共4页 Information Security and Communications Privacy
关键词 椭圆曲线 二元椭圆曲线 KOBLITZ曲线 双有理等价 elliptic curve binary Edwards curve Koblitz curve birationally equivalence
  • 相关文献

参考文献2

二级参考文献16

  • 1殷新春,汪彩梅,陈决伟.有限域上素数阶的安全椭圆曲线的选取及实现[J].计算机应用研究,2006,23(8):95-96. 被引量:2
  • 2[1]Kasuyuki Okeya,Hiroyuki Kurumatani,Kouichi Sakurai.Elliptic curves with the Montgomery-Form and Their Cryptographic Applications[J].PKC 2000,LNCS 1751,2000:238~257.
  • 3[2]Montgomery P L.Speeding the Pollard and Elliptic Curve Methods of Factorization[J].Mathematics of Computation,1987,48(177):243~264.
  • 4[3]Toru Akishita.Fast Simultaneous Scalar Multi plication on Elliptic Curve with Montgomery Form.SAC 2001,LNCS2259,2001,255~267
  • 5[4]Koche C P.Timing Attacks on Implementations of Diffie-Hellman,RSA,DSS and Other Systems[C].Advances in Cryptology-CRYPTO'96.LNCS1109,1996,104~113.
  • 6[6]Fouquet M,Gaudry P,Harley R.Finding Secure Curves with the Satoh-FGH Algorithm and an Early-Abort Strategy.In Advances in Cryptoloy-EUROCRYPT'2001,LNCS.Springer Verlag,2001.
  • 7[7]Lercier R.Finding Good Random Elliptic Curves for Cryptosystems Defined over[C].Advances in Cryptoloy-EUROCRYPT'97,LNCS.Springer Verlag,1997.
  • 8[9]张晓磊.椭圆曲线密码中若干问题的研究[D].中国科技大学硕士学位论文,2003.
  • 9M. Bellare and P. Rogaway. The exact security of digital signatures how to sign with RSA and Rabin.In Advances in Cryptology-EUROCRYPT 6, volume 1070 of Lecture Notes in Computer Science,Springer-Verlag, 1996, pages 399-416.
  • 10Boneh D., The decision diffie-hellman problem, In Proc. Of the 3rd International Algorithmic Number Theory Symposium, volume 1423 of Lecture Notes in Computer Science,Portland.Oregon,USA,June 1998.Springer-Verlag, pages 48-63

共引文献1

同被引文献5

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部