期刊文献+

高效加密预计算RSA算法实现方法 被引量:1

A High-Speed Encryption Pre-Calculated RSA Algorithm
下载PDF
导出
摘要 本文提出了一种随机预先计算RSA算法。实验结果表明,相比原始公钥密码算法RSA17次模n乘法运算复杂度,随机预先计算RSA算法计算复杂度只需4次模n乘法运算,揭示了预计算RSA算法的加密时间复杂度小,在很大程度上提高了加密速度,有利于实践应用。 A random pre-calculated RSA algorithm is given in this paper. It claimed that the time complexity of pre-calculated RSA algorithm's encryption is less by using public key cryptography original RSA algorithm. The encryption efficiency in pre-calculated RSA algorithm is improved, which is useful for application.
作者 谢芳清 刘佳
出处 《自动化与信息工程》 2010年第2期41-42,共2页 Automation & Information Engineering
基金 仲恺农业工程学院校级科研基金项目(G3091814)
关键词 RSA算法 时间复杂度 加密 RSA Algorithm Time Complexity Encryption
  • 相关文献

参考文献8

  • 1Rivest, R.; A. Shamir; L. Adleman. "A Method for Obtaining Digital Signatures and Public-Key Cryptosyst-ems". Communications of the ACM 21(2): 120-126.
  • 2Smart, Nigel P.Errors matter: Breaking RSA-based PIN encryption with thirty ciphertext validity queries[C]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2010, 5985:15-25.
  • 3Sarkar Santanu, Maitra Subhamoy.Cryptanalysis of RSA with more than one decryption exponent[C]. Information Processing Letters, 110(8-9): 336-340.
  • 4张亚玲,张璟,王晓峰.一个高效的基于身份和RSA的紧致多重数字签名方案[J].电子与信息学报,2008,30(9):2246-2249. 被引量:10
  • 5姚国祥 林良超.RSA密钥对高效生成算法.计算机工程,2007,33(20):148-149,152.
  • 6张宝华,殷新春.RSA密码算法的安全及有效实现[J].中山大学学报(自然科学版),2008,47(6):22-26. 被引量:8
  • 7徐文华,贺前华,李韬.基于强RSA假设的数字签名方案[J].华中科技大学学报(自然科学版),2008,36(12):24-26. 被引量:6
  • 8Alfred J. Menezes,Paul C. van Oorschot, Scott A. Vanstone. Handbook of Applied Cryptography[M]. CRC Press series on discrete mathematics and its applications, 1996, 617-619.

二级参考文献33

  • 1王天银,张建中.一种按序多重数字签名方案的安全性分析及改进[J].河南科技大学学报(自然科学版),2005,26(1):31-34. 被引量:3
  • 2韩军,曾晓洋,汤庭鳌.RSA密码算法的功耗轨迹分析及其防御措施[J].计算机学报,2006,29(4):590-596. 被引量:19
  • 3曹正军,刘木兰.一个基于强RSA数字签名方案的改进[J].计算机学报,2006,29(9):1617-1621. 被引量:6
  • 4KOCHER C. Timing attacks on implementations of Diffie- Hellman, RSA , DSS, and other systems [ C ]//Proceeding of the Advances in Cryptography ( CRYPTO' 96), Springer-Verlag, 1997 : 104 - 113.
  • 5KOCHER C, JAFFE J, JUN B. Differential power analysis [ C ]//Proceeding of the Advances in Cryptography ( CRYPTO' 99), Springer- Verlag, 1999 : 388 - 397.
  • 6MONTGOMERY P L. Speeding the Pollard and elliptic curve methods of factorization [ J ]. Mathematics of Computation, 1987, 48 (177) : 243 - 264.
  • 7MESSERGES T S. DABBISH E A, SLOAN R H. , Power analysis atta-cks of modular exponentiation in smartcards [ C ]//Proceeding of the workshop on Cryptographic Hardware and Embedded Systems ( CHES' 99 ), Springer-Verlag, 2000 : 144 - 157.
  • 8MESSERGES T S. Power analysis attacks and countermeasures for cryptographic algorithms [ D ]. Chicago:Graduate College of the University of Illionois, 2000.
  • 9WALTER C. Sliding windows succumbs to big mac attack [ C ]//Proceeding of the workshop on Cryptographic Hardware and Embedded Systems( CHES'01 ), Springer- Verlag, 2001:286 - 299.
  • 10VLASTIMILI K, TOMAS R, Futher results and considerations on side channel attacks on RSA [ C]//Proceeding of the workshop on Cryptographic Hardware and Embedded Systems ( CHES' 02 ), Springer-Verlag, 2002 : 244 - 259.

共引文献26

同被引文献8

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部