期刊文献+

基于椭圆曲线的签名算法研究 被引量:3

Research on Algorithm of Signature Based on Elliptic Curve
下载PDF
导出
摘要 针对现有的椭圆曲线签名算法的缺点,提出了一种新的算法。此算法不需要基点的阶参与运算,可以大大降低系统的运算负担和信息安全系统的开发成本。 A new algorithm of signature based on elliptic curve is offered in this paper. The aim is to offset shortcoming of ECDSA. The order of base point is not necessary in the new method, so that burden of computing is cut down consumedly, and the cost of system is reduced wanderflly.
作者 胡世顺
出处 《计算机应用》 CSCD 北大核心 2003年第2期43-44,共2页 journal of Computer Applications
关键词 椭圆曲线 签名算法 信息安全 有限域 密码 elliptic curve finite field signature
  • 相关文献

参考文献2

  • 1Duncan Alexander Crutchley.Project report: Cryptography and Elliptic Curves[]..1999
  • 2Johnson D,Menezes A,Vanstone S.Research report: The Elliptic Curve Digital Signature Algorithm[]..2001

同被引文献11

  • 1L Lamport.Password authentication with insecure communication[J].Comm of the ACM,1981;24(11):770~772.
  • 2M S Hwang,L H Li Wu.A new remote user authentication with smart card[J].IEEE trans on consumer electron,2000;46(1):28~30.
  • 3C K Chan,L M Cheng. Cryptanalysis of a remote user authenticationscheme using smart cards[J].IEEE trans on consumer electron,2000;46(4) :992~993.
  • 4C C Chang,K F Hwang. Some forgery attacks on a remote user authentication scheme using smart cards[J].Informatics,2003;14(3):289~294.
  • 5J J Shen,C W Lin,M S Hwang. A modified remote user authentication scheme using smartcards[J].IEEE trans onconsumer Electron,2003;49(2):414~416.
  • 6K-C Leung,L M Cheng,A S Fong et al. Cryptanalysis of a modified remote user authentication scheme using smart cards[J].IEEE trans on Consumer Electron,2003;49(4):1243~1245.
  • 7Amit K Awasthi,Sunder Lal.An Enhanced Remote User Authentication Scheme Using Smart Cards[J].IEEE trans on Consumer Electron,2004;50(2) :583~586.
  • 8LenStra,E R Verheul. Selecting cryptographic key sizes[C].In:the 3rd workshop on ECC ,waterloo ,cananda, 1999-11.
  • 9Noblitz N.Elliptic curve cryptosystems[J].Math of Comput, 1987;(48):203~209.
  • 10ElGamal T.A public key cryptosystem and a signature scheme based on discrete logarithms[J].IEEE Trans on info Theory,1985;31(4):469~472.

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部