期刊文献+

椭圆曲线密码系统的关键问题研究

Realization of Elliptic Curve Cryptography
下载PDF
导出
摘要 论文给出了实现椭圆曲线密码系统的主要过程,包括有限域的选取、安全椭圆曲线的选取、基点的选取、标量乘法的实现。 This paper puts forward to primary steps on how to realize Elliptic Curve Cryptography,including choosing finite prime field,choosing secure curve,choosing base point,and arithmetic of scalar multiplication.
作者 何春
出处 《计算机与数字工程》 2013年第5期777-778,788,共3页 Computer & Digital Engineering
关键词 椭圆曲线密码系统 有限域 基点 标量乘法 elliptic curve cryptography finite prime field base point scalar multiplication
  • 相关文献

参考文献3

二级参考文献13

  • 1王会梅,王永杰,鲜明.基于移动agent的网络攻击效果评估数据采集[J].计算机工程,2007,33(14):160-162. 被引量:7
  • 2张松敏,卢向华.浅谈面向对象技术、Agent技术和网格技术[J].山西科技,2007(4):46-47. 被引量:1
  • 3[2]V.Miller,Uses of elliptic curves in cryptography,Advances in Cryptology-CRYPTO' 85.LNCS218,Santa Barbara,Calif.,Springer-Verlag,1986,417-426.
  • 4[3]Multiprecision Integer and Rational Arithmetic C/C++ Library(MIRCAL),available at http://indigo.ie/~msoott/.
  • 5[4]A.Menezes,T.Okamnoto,S.Vanstone,Reducing elliptic curve logarithms to logarithms in a finitoe field.IEEE Trans.on Information Theory,1993,39(5),1639-1646.
  • 6[5]N.Koblitz,A Course in Number Theory and Cryptogralphy,2nd e7ition.Spring-Verlag.1994.Ch.6.
  • 7[6]N.Koblitz,Algebraic Aspects of Cryptography,Algorithms and Computation in Math.Editors:E.Becker,M.Bronstein,H.Cohen,3(1998),Berlin Heidelberg,Springer-Verlag,1998,Ch.6.
  • 8[7]IEEE P1363,Standard Specifications for Public-Key Cryptography,Ballot Draft.1999,Drafts available at http://indigo,ie/~msoott/.
  • 9[8]R.Schoof,Elliptic curves over finite fields and the computation of square roots modp.Math.Comp.,1985,44(170),483-494.
  • 10[9].T.Izu,J.kogure,M.Noro,K.Yokoyama,Efficient Implementation of Sehoof's Algorithm.Asi acrypt'98,Berlin Heidelberg,Springer-Verlag,1998,66-79.

共引文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部