期刊文献+

基于椭圆曲线的充值卡加密

Encryption of prepaid cards based on elliptic curve
下载PDF
导出
摘要 随着信息科技的发展,生活节奏的加快,越来越多的人选择购买充值卡进行必要的储值,充值卡的安全性显得越来越重要。随着椭圆曲线在加密解密方面的广泛应用,在熟悉了椭圆曲线加密解密的一般原理之后,可以基于椭圆曲线设计充值卡的加密方案,其安全性依赖于椭圆曲线中的离散对数问题。 With the development of information technology and the gradually accelerated pace of life,more and more people prefer to purchase prepaid card for recharge necessarily.Therefore it is particularly important for the safety of prepaid cards.With the wide application of elliptic curve in encryption and decryption program,this paper design a cryptographic scheme on the basis of a well-rounded understanding of elliptic curve.The security of the cryptographic scheme is based on the difficulty of elliptic curve discrete logarithm.
出处 《信息技术》 2012年第10期68-71,共4页 Information Technology
关键词 加密 椭圆曲线 离散对数 encryption elliptic curve discrete logarithms
  • 相关文献

参考文献9

  • 1Menezes A.Elliptic Curve Public Key Cryptosystems[M].Boston Kluwer Academic Publishers,1993.
  • 2Koblitz N.Elliptic Curve Cryptosystem[J].Mathematics of Compu-tation,1987(48):203-209.
  • 3Koblitz N.The state of Elliptic Curve Cryptography[J].Designs Codes and Cryptography,2000(19):173-193.
  • 4Miller V.Use of Elliptic Curves in Cryptography[C].Proceedings of CR YPTO’85.New York:Springer Verlag,1985.
  • 5Victor S.Uses of Elliptic Curves in Cryptography[J].Lecture Notes in Computer Science,1986(218):417-426.
  • 6DARREL H,ALFRED M,SCOTY V.椭圆曲线密码导论[M].张焕国,译.北京:电子工业出版社,2005
  • 7周文平,徐赐文,韩会朋,张霄.椭圆曲线密码体制的研究现状[J].中央民族大学学报(自然科学版),2005,14(3):228-235. 被引量:5
  • 8卢忱,周秦武,卞正中,王秉康,郝伟.椭圆曲线密码体制基点选取算法的设计与实现[J].西安交通大学学报,2000,34(6):27-30. 被引量:22
  • 9杨波.网络安全与应用[M].电子工业出版社,2002.

二级参考文献17

  • 1户军茹,韩益亮.椭圆曲线密码体制相关问题[J].通信技术,2003,36(12):151-152. 被引量:2
  • 2[16]Public Key Cryptography for Financial Service Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA)[S]. ANSIX9.62- 1998, American Bankers Association, Working Draft, 1998.
  • 3[1]C E SHANNON. Communication Theory of Secrecy Systems[J]. Bill System Technical Journal, 1949,28(4) :656 - 715.
  • 4[2]WHITFIELD DIFFIE, MARTIN HELLMAN. New Directions in Cryptography[J]. IEEE Trans Inform. Theroy, 1976, IT-22: 644 - 654.
  • 5[3]RSA LABORATORIES. PKCS # 1-RSA Cryptography Standard[A]. Version 2.0, RSA Data Security[C]. 1998.
  • 6[4]NIST. FIPS PUB 186 - 1: Digital Signature Standard[A]. National Institute of Standards and Technology[C]. 1994.
  • 7[5]KOBLTTZ N. Elliptic curve cryptosystems[J]. Mathematics of Computation, 1987, 48:203 -209.
  • 8[6]MILLER V. Uses of elliptic curves in cryptography[J]. Lecture Notes in Computer Science, 1986, 218: 417 - 426.
  • 9[7]NEAL KOBLITZ. The State of Elliptic Curve Cryptography[J]. Designs、Codes and Cryptography, 2000, 19:173 - 193.
  • 10[10]DARREL HANKERSON, ALFRED MENEZES, SCOTT VANSTONE. Guide to Elliptic Curve Cryptography[ M ]. 2004.

共引文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部