期刊文献+

高度优先加法链m元标量速乘算法研究 被引量:2

Research on fast scalar multiplication algorithm named improved-m-ary based on height-first-addition-chain
下载PDF
导出
摘要 为提高标量点乘在移动计算设备中的运算效率,并增强其计算安全性,比较分析了加法链方法、m-ary方法等标量点乘方法的执行过程和加速性能特征,提出了基于高度优先加法链和自由窗口宽度的Improved-m-ary的标量点乘方法。分析结论和实验仿真数据表明,该方法能有效减轻标量平均汉明重量,降低标量点乘计算量,内嵌的窗口值杂乱化机制使得其针对旁路信道分析攻击表现出出色的免疫力。 To improve the efficiency of point-scalar-multiplication in the mobile device with weak computation power,and to build up the computational security of that,by comparison and analysis of the advantages of addition-chain-method,m-ary and other algorithms respectively in terms of speeding computation,and a novel algorithm named Improved-m-ary is presented,which is based on height first addition chain scheme and improved m-ary supporting flexible window width.The analysis result and expermental data show the method can reduce the average of hamming weight and spare computation cost of point-scalar-multiplication.In addition,because of the built-in scheme of randomizing sliding window width,a favorable strong immunity is provided against by-side analysis attack.
出处 《计算机工程与设计》 CSCD 北大核心 2011年第12期4002-4004,4019,共4页 Computer Engineering and Design
基金 湖南省自然科学基金项目(09JJ6086)
关键词 高度优先 加法链 自由窗口宽度 椭圆密码 改进m元方法 height first addition chain flexible window width ECC I-m-ary
  • 相关文献

参考文献8

二级参考文献29

  • 1陈德荣,吴宁.集群通信系统[J].电信科学,1994,10(6):59-60. 被引量:1
  • 2LeiHu,Jun-WuDong,Ding-YiPei.Implementation of Cryptosystems Based on Tate Pairing[J].Journal of Computer Science & Technology,2005,20(2):264-269. 被引量:8
  • 3刘继春,林顺发.ARCH型有限阶双线性模型的平稳性[J].莆田学院学报,2006,13(5):16-19. 被引量:1
  • 4[1]E BIHAM,A SHAMIR.Differential fault analysis of secret cryptosystems.Cyrptogy-CRYPTO' 1975,10:25-26.
  • 5[2]E BIHAM,A SHAMIR.Differential Cryptanalysis of the Data encryption Standard.ISEC,1993,78:15-22,200.
  • 6[3]M MATSUI.Cryptanalysis Method for DES Cipher.Cryptology-Eurocrypt'93 Proceedings,1994(2):45-47..
  • 7[4]DIFFIE W,HELLMAN M E.Exhaustive Cryptanalysis of the NBS Data Encryption Standard.Computer,1997,10:30-34.
  • 8[5]MASTUI.The first experimental cryptanalysis of data encryption standard.Cryptology-Eurocrypt'94 Proceedings,1994(2):25-30.
  • 9[1]Gordon D M.A Survey of Fast Exponentiation Methods[J].Journal of Algorithms,2006,27:129-146.
  • 10[2]Koyama K,Tsuruoka Y.Speeding up Elliptic Cryptosystems by Using a Signed Binary Window Method.In:Brickell EF ed.Advance in Cryptology-Crypto'92.LNCS 740[M].Berlin\Heidelberg:Springer-Verlag,1998.345-357.

共引文献42

同被引文献9

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部