期刊文献+

素数域椭圆曲线密码系统算法实现研究 被引量:3

Analysis on Implementation of the Elliptic Curve Cryptography over Prime Fields
下载PDF
导出
摘要 针对素数域椭圆曲线密码系统的算法高速实现,分别讨论了对椭圆曲线上的点的加法和倍点运算,以及对点的标量乘法运算进行优化的技术,同时给出了测试比较结果,说明了所讨论的优化技术可以大大提高整个椭圆曲线密码系统的算法实现性能。 For the high-speed implementation of elliptic curve cryptography over prime fields, the optimizing techniques of elliptic curve points doubling, points addition and points scalar multiplication have been discussed. Some algorithm performance data about using these techniques is given and compared, and the data shows these optimizing techniques can remarkably improve the performance of elliptic curve cryptography.
出处 《计算机工程》 CAS CSCD 北大核心 2003年第16期6-7,10,共3页 Computer Engineering
基金 国家自然科学基金资助项目(69973004 60003015)
关键词 椭圆曲线密码系统 点的加法 倍点运算 标量乘法 不相邻格式 滑动窗口 Elliptic curve cryptography system Point addition Point doubling Scalar multiplication Non-adjacent form Sliding-window
  • 相关文献

参考文献4

  • 1Koblilz N.Elliptic Curve Cryptosystems. Mathematics of Computation,1987, 48:203-209.
  • 2Miller V.Uses of Elliptic Curves in Cryptography.Advances in Cryptology-Crypto'85, LNCS 218. 1986:417-426.
  • 3Cohen H,Miyaji A,Ono T.Efficient Elliptic Curve Exponentiation Using Mixed Coordinates.Advances in Cryptology-Asiacrypt'98,LNCS 1514, 1998:51-65.
  • 4Egccioglu O, Koc C K.Fast Modular Exponcntiation.Proceeding of 1990 Bilkcnt International Conference on New Trends in Communication, Control, and Signal Processing, Ankara, Turkey,Amsterdam, Nctherlands; Elsevier, 1900, 1 : 188-194.

同被引文献17

  • 1宋莹,高雪松,季晓勇.CPLD在DSP系统中的应用设计[J].电子技术应用,2004,30(8):65-66. 被引量:7
  • 2梁建霞,苏广川.基于GF(2^m)域上椭圆曲线数字签名的快速实现[J].计算机应用与软件,2005,22(4):96-98. 被引量:2
  • 3刘双根,李萍,胡予濮.椭圆曲线密码中标量乘算法的改进方案[J].计算机工程,2006,32(17):28-29. 被引量:7
  • 4Koblitz N. Elliptic Curve Cryptosystems[J].Mathematics of Computation, 1987, 48(177) :203-209.
  • 5Miller V S. Use of Elliptic Curves in Cryptography[C]. Proc. Of CRYPTO'85. New York, USA: Springer- Verlag, 1986:417-426.
  • 6KOBLITZ.Elliptic Curve Cryptosystems[J].Mathematics of Computation,1987,48:203-209.
  • 7Menezesa J,Vanstone S A,Zuccherato P J.Counting Points on Elliptic Curve Over F2^m[J].Math of Comp,1993,60(201):407-420.
  • 8Terr D.A Modification of Shanks' Baby-Step Giant-Step Algorithm[J].Mathematics of Computation,1999,69(230):767-773.
  • 9Odlyzko A M.Discrete Logarithms in Finite Fields and Their Cryptographic Significance[C].In:Eurocrypt' 84,LNCS 209,1985:224-314.
  • 10Willian Stallings.密码编码学与网络安全:原理与实践(第二版)[M].杨明等译.北京:电子工业出版社,2001.

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部