期刊文献+

椭圆曲线上密码研究现状与展望 被引量:8

View of the Cryptology on Elliptic Curves
下载PDF
导出
摘要 系统地论述了椭圆曲线密码 (ECC)理论研究的基本现状。比较了 ECC与经典公钥密码体系间的优劣 ,阐述了 Lenstra和 Verheul的工作 ;简要地描述了椭圆曲线上的基本算法及椭圆曲线的基本密码学性质 ;介绍了围绕密码学基础、安全性展开的椭圆曲线挑战情况和 ECC标准化状况 ,重点介绍了 ANSI标准X9.62—— ECDSA的主要内容 ,对 ECC的核心基础——椭圆曲线的离散对数问题 (ECDLP)算法及其攻击情况给出了详细的论述。最后分析了明文的 EC编码、典型 EC密码体制和快速 ECC研究状况 ,提出了今后公钥密码及 In this paper, the basic contents of the cryptology on elliptic curves are summarized. The ECC and classical public key cryptogram system are compared. The rule discovered by Lenstra and Verheul is presensed. A simple description is given to the basic arithmetic and cryptography property on elliptic curves. The case of the Certicom ECC challenge is displayed. Depiction is made of the main contents of the ANSI Standard X9.62--ECDSA. The discrete logarithm on elliptic curves and attacks against ECDLP is discussed in detail. Finally analysis is made of the EC coding, classical EC cryptosystem and the study about fast ECC. The possible directions and contents of the study on ECC are displayed.
作者 王衍波
出处 《解放军理工大学学报(自然科学版)》 EI 2002年第6期18-25,共8页 Journal of PLA University of Science and Technology(Natural Science Edition)
关键词 研究现状 椭圆曲线密码理论 离散对数 ANSI标准X9.62 公钥密码体制 密码学 ellitpic curves cryptology public key discrete logarithm ANSI standards X9.62 codeing
  • 相关文献

参考文献23

  • 1KOBLITZ N. Elliptic curve cryptosystems [J].Mathematics of Computation, 1987,48 : 203-209.
  • 2Muller V. Use of elliptic curves in cryptography[A]. In.. Advances in Cryptology Proceedings of CRYPTO' 85, LNCS218 [C]. Springer-Verlag,1985. 417-416.
  • 3SCHOOF R. Elliptic curves over finite fields and the computation of square roots mod p [J]. Math Comp,1985,54:483-494.
  • 4KOBLITZ N. Constructing elliptic curve cryptosysterns in characteristic 2^m[A]. In: Advances in Cryptology-Crypto' 90, LNCS 537 [C], Springer-Verlag,1991.
  • 5DEWAGHE L. Remarks on the schoff-Elkies-Atkin algorithm [J]. Math Comp, 1998, 67 (223): 1247-1252.
  • 6SATOH T, KRAKI K. Format quotients and the polynomial time discrete log algorithm for anomalous elliptic curves [J]. Commentarii Mathematici Universitatis Sancki Pauli, 1998,47:81-92.
  • 7FOUQUET M, GAUDRY P, HARLEY R. An extension of Satoh' s algorithm and its implementation[J]. J Remannujan Math Soc, 2000,15:281-318.
  • 8Certicom. ECC challenge [DB/OL]. http://www.certicom. com, 1997-11.
  • 9ESCOTT A, SAGER J, SELKIRK A, TSAPAKIDS D. Attacking elliptic curve cryptosystems using the parallel pollard rho method [J]. CryptoBytes-The Technical Newsletter of RSA Laboratories, 1999,2(4):15-19.
  • 10ISO/IEC 14888-3-99, Information technology-security technictues-cryptographic techniques based on elliptic curves, Committee Draft (CD) [S].

同被引文献62

  • 1杨晨.《中华人民共和国电子签名法》[J].信息网络安全,2005(6):80-80. 被引量:1
  • 2袁丹寿,戎蒙恬,陈波.一种快速有限域乘法器结构及其VLSI实现[J].微电子学,2005,35(3):314-317. 被引量:4
  • 3刘克.王小云教授在密码破译方面取得突破性进展[J].中国科学基金,2005,19(4):256-256. 被引量:4
  • 4Revest R, Shamir A. Payword and rnicromint: Two sinaple micropayment protocols [ C ]//Proc. Security Protocols, LNCS1189. Berlin : Springer Verlag, 1996 : 69 - 88.
  • 5Pedersen T. Electronic payment of small amounts [ C ]//Proc. Security Protocols, LNCS1189. Berlin: Springer Verlag, 1996 : 59 - 68.
  • 6Cox B,Tygar J D,Sirbu M. NetBill security and transaction protocol. In Proceedings of the First USENIX Workshop on Electronic Commerce,1995.
  • 7Lamport L. Password authentication with insecure communication [ J] . Commun. ACM ,1981 ,124( 11 ) : 770 - 772.
  • 8LIU D,TAN Z Y,DAI Y Q.New elliptic curve multi-scalar multiplication algorithm for a pair of integers to resist SPA[J].Lecture Notes in Computer Science,2009,5487:253-264.
  • 9SHOHDY S,EL-SISI A,ISMAIL N.FPGA implementation of elliptic curve point multiplication over GF(2191)[J].Lecture Notes in Computer Science,2009,5576:619-634.
  • 10WANG C L,LIN J L.A systolic architecture for computing inverses and divisions in GP(2m)[J].IEEE Trans Computer,2000,49(8):1141-1146.

引证文献8

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部