期刊文献+
共找到594篇文章
< 1 2 30 >
每页显示 20 50 100
Remote sensing image encryption algorithm based on novel hyperchaos and an elliptic curve cryptosystem
1
作者 田婧希 金松昌 +2 位作者 张晓强 杨绍武 史殿习 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期292-304,共13页
Remote sensing images carry crucial ground information,often involving the spatial distribution and spatiotemporal changes of surface elements.To safeguard this sensitive data,image encryption technology is essential.... Remote sensing images carry crucial ground information,often involving the spatial distribution and spatiotemporal changes of surface elements.To safeguard this sensitive data,image encryption technology is essential.In this paper,a novel Fibonacci sine exponential map is designed,the hyperchaotic performance of which is particularly suitable for image encryption algorithms.An encryption algorithm tailored for handling the multi-band attributes of remote sensing images is proposed.The algorithm combines a three-dimensional synchronized scrambled diffusion operation with chaos to efficiently encrypt multiple images.Moreover,the keys are processed using an elliptic curve cryptosystem,eliminating the need for an additional channel to transmit the keys,thus enhancing security.Experimental results and algorithm analysis demonstrate that the algorithm offers strong security and high efficiency,making it suitable for remote sensing image encryption tasks. 展开更多
关键词 hyperchaotic system elliptic curve cryptosystem(ecc) 3D synchronous scrambled diffusion remote sensing image unmanned aerial vehicle(UAV)
下载PDF
A Secure Hardware Implementation for Elliptic Curve Digital Signature Algorithm
2
作者 Mouna Bedoui Belgacem Bouallegue +4 位作者 Abdelmoty M.Ahmed Belgacem Hamdi Mohsen Machhout Mahmoud M.Khattab 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2177-2193,共17页
Since the end of the 1990s,cryptosystems implemented on smart cards have had to deal with two main categories of attacks:side-channel attacks and fault injection attacks.Countermeasures have been developed and validat... Since the end of the 1990s,cryptosystems implemented on smart cards have had to deal with two main categories of attacks:side-channel attacks and fault injection attacks.Countermeasures have been developed and validated against these two types of attacks,taking into account a well-defined attacker model.This work focuses on small vulnerabilities and countermeasures related to the Elliptic Curve Digital Signature Algorithm(ECDSA)algorithm.The work done in this paper focuses on protecting the ECDSA algorithm against fault-injection attacks.More precisely,we are interested in the countermeasures of scalar multiplication in the body of the elliptic curves to protect against attacks concerning only a few bits of secret may be sufficient to recover the private key.ECDSA can be implemented in different ways,in software or via dedicated hardware or a mix of both.Many different architectures are therefore possible to implement an ECDSA-based system.For this reason,this work focuses mainly on the hardware implementation of the digital signature ECDSA.In addition,the proposed ECDSA architecture with and without fault detection for the scalar multiplication have been implemented on Xilinxfield programmable gate arrays(FPGA)platform(Virtex-5).Our implementation results have been compared and discussed.Our area,frequency,area overhead and frequency degradation have been compared and it is shown that the proposed architecture of ECDSA with fault detection for the scalar multiplication allows a trade-off between the hardware overhead and the security of the ECDSA. 展开更多
关键词 elliptic curve cryptography(ecc) Montgomery ladder fault detection method fault injection attack digital signature ECDSA FPGA
下载PDF
结合ECC算法的电力监控网络智能接入协议 被引量:1
3
作者 曹小明 张华兵 +2 位作者 叶思斯 石宏宇 魏理豪 《沈阳工业大学学报》 CAS 北大核心 2024年第1期60-65,共6页
为了进一步降低电力监控网络遭受攻击的风险,基于ECC公钥加密算法,提出了具有较高安全性能的智能接入协议。通过研究电力监控网络的基本架构和安全体系,总结了电力监控终端所面临的多种攻击方式。并在此基础上,利用ECC公钥加密算法,深... 为了进一步降低电力监控网络遭受攻击的风险,基于ECC公钥加密算法,提出了具有较高安全性能的智能接入协议。通过研究电力监控网络的基本架构和安全体系,总结了电力监控终端所面临的多种攻击方式。并在此基础上,利用ECC公钥加密算法,深度改进适用于电力监控网络的智能接入协议,进而优化协议的加密耗时、解密耗时及安全强度等多项参数。仿真结果表明,与基于RSA算法的协议相比,基于ECC算法的智能接入协议具备更高的安全强度。 展开更多
关键词 电力信息网络 输电线路 实时监控 安全接入 椭圆曲线算法 身份验证 安全协议 ecc公钥算法
下载PDF
An FPGA Implementation of GF(p) Elliptic Curve Cryptographic Coprocessor 被引量:1
4
作者 LIUYu-zhen QINZhong-ping ZHANGHuan-guo 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期31-34,共4页
A GF(p) elliptic curve cryptographic coprocessor is proposed and implemented on Field Programmable Gate Array (FPGA). The focus of the coprocessor is on the most critical, complicated and time-consuming point multipli... A GF(p) elliptic curve cryptographic coprocessor is proposed and implemented on Field Programmable Gate Array (FPGA). The focus of the coprocessor is on the most critical, complicated and time-consuming point multiplications. The technique of coordinates conversion and fast multiplication algorithm of two large integers are utilized to avoid frequent inversions and to accelerate the field multiplications used in point multiplications. The characteristic of hardware parallelism is considered in the implementation of point multiplications. The coprocessor implemented on XILINX XC2V3000 computes a point multiplication for an arbitrary point on a curve defined over GF(2192?264?1) with the frequency of 10 MHz in 4.40 ms in the average case and 5.74 ms in the worst case. At the same circumstance, the coprocessor implemented on XILINX XC2V4000 takes 2.2 ms in the average case and 2.88 ms in the worst case. 展开更多
关键词 elliptic curve cryptosystems cryptographic coprocessor CRYPTOGRAPHY information security
下载PDF
Efficient Dynamic Threshold Group Signature Scheme Based on Elliptic Curve Cryptosystem 被引量:2
5
作者 夏祥胜 洪帆 +1 位作者 耿永军 崔国华 《Journal of Southwest Jiaotong University(English Edition)》 2008年第1期18-23,共6页
The short secret key characteristic of elliptic curve cryptosystem (ECC) are integrated with the ( t, n ) threshold method to create a practical threshold group signature scheme characterized by simultaneous signi... The short secret key characteristic of elliptic curve cryptosystem (ECC) are integrated with the ( t, n ) threshold method to create a practical threshold group signature scheme characterized by simultaneous signing. The scheme not only meets the requirements of anonymity and traceability of group signature but also can withstand Tseng and Wang's conspiracy attack. It allows the group manager to add new members and delete old members according to actual application, while the system parameters have a little change. Cryptanalysis result shows that the scheme is efficient and secure. 展开更多
关键词 elliptic curve cryptosystem Group signature Threshold scheme Dynamic threshold group signature
下载PDF
Image encryption technique based on new two-dimensional fractional-order discrete chaotic map and Menezes–Vanstone elliptic curve cryptosystem 被引量:1
6
作者 Zeyu Liu Tiecheng Xia Jinbo Wang 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第3期161-176,共16页
We propose a new fractional two-dimensional triangle function combination discrete chaotic map(2D-TFCDM)with the discrete fractional difference.Moreover,the chaos behaviors of the proposed map are observed and the bif... We propose a new fractional two-dimensional triangle function combination discrete chaotic map(2D-TFCDM)with the discrete fractional difference.Moreover,the chaos behaviors of the proposed map are observed and the bifurcation diagrams,the largest Lyapunov exponent plot,and the phase portraits are derived,respectively.Finally,with the secret keys generated by Menezes-Vanstone elliptic curve cryptosystem,we apply the discrete fractional map into color image encryption.After that,the image encryption algorithm is analyzed in four aspects and the result indicates that the proposed algorithm is more superior than the other algorithms. 展开更多
关键词 CHAOS fractional two-dimensional triangle function combination discrete chaotic map image encryption Menezes-Vanstone elliptic curve cryptosystem
下载PDF
Secure Authentication of WLAN Based on Elliptic Curve Cryptosystem 被引量:1
7
作者 张龙军 韩玮 陈克非 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第5期645-650,共6页
The security of wireless local area network (WI.AN) becomes a bottleneck for its further applications. At present, many standard organizations and manufacturers of WLAN try to solve this problem. However, owing to t... The security of wireless local area network (WI.AN) becomes a bottleneck for its further applications. At present, many standard organizations and manufacturers of WLAN try to solve this problem. However, owing to the serious secure leak in IEEES02.11 standards, it is impossible to utterly solve the problem by simply adding some remedies. Based on the analysis on the security mechanism of WLAN and the latest techniques of WI.AN security, a solution to WLAN security was presented. The solution makes preparation for the further combination of WLAN and Internet. 展开更多
关键词 SECURITY wireless local area network (WLAN) elliptic curve cryptosystem
下载PDF
ELLIPTIC CURVE CRYPTOGRAPHY BASED AUTHENTICATED KEY AGREEMENT WITH PRE-SHARED PASSWORD 被引量:1
8
作者 SuiAifen LucasC.K.Hui +1 位作者 YangYixian K.P.Chow 《Journal of Electronics(China)》 2005年第3期268-272,共5页
Based on elliptic curve Diffie-Hellman algorithm, an Elliptic Curve Authenticated Key Agreement (ECAKA) protocol with pre-shared password is proposed. Its security relies on the Elliptic Curve Discrete Logarithm Probl... Based on elliptic curve Diffie-Hellman algorithm, an Elliptic Curve Authenticated Key Agreement (ECAKA) protocol with pre-shared password is proposed. Its security relies on the Elliptic Curve Discrete Logarithm Problem (ECDLP). It provides identity authentication, key validation and perfect forward secrecy, and it can foil man-in-the-middle attacks. 展开更多
关键词 elliptic curve Cryptography (ecc) DIFFIE-HELLMAN Simple Authenticated Key Agreement (SAKA)
下载PDF
DYNAMIC ID-BASED REMOTE USER MUTUAL AUTHENTICATION SCHEME WITH SMARTCARD USING ELLIPTIC CURVE CRYPTOGRAPHY
9
作者 SK Hafizul Islam G.P.Biswas 《Journal of Electronics(China)》 2014年第5期473-488,共16页
In the literature, several dynamic ID-based remote user mutual authentication schemes are implemented using password, smartcard and Elliptic Curve Cryptography(ECC), however, none of them provides resilience against d... In the literature, several dynamic ID-based remote user mutual authentication schemes are implemented using password, smartcard and Elliptic Curve Cryptography(ECC), however, none of them provides resilience against different attacks. Therefore, there is a great need to design an efficient scheme for practical applications. In this paper, we proposed such a scheme in order to provide desired security attributes and computation efficiencies. Compared with other existing techniques, our scheme is more efficient and secured. In addition, our scheme is provably secure in the random oracle model under the hardness assumption of computational Diffie-Hellman problem. 展开更多
关键词 elliptic curve Cryptography(ecc) Smartcard Mutual authentication PASSWORD Perfect forward secrecy
下载PDF
Improved Software Implementation for Montgomery Elliptic Curve Cryptosystem
10
作者 Mohammad Al-Khatib Wafaa Saif 《Computers, Materials & Continua》 SCIE EI 2022年第3期4847-4865,共19页
The last decade witnessed rapid increase in multimedia and other applications that require transmitting and protecting huge amount of data streams simultaneously.For such applications,a high-performance cryptosystem i... The last decade witnessed rapid increase in multimedia and other applications that require transmitting and protecting huge amount of data streams simultaneously.For such applications,a high-performance cryptosystem is compulsory to provide necessary security services.Elliptic curve cryptosystem(ECC)has been introduced as a considerable option.However,the usual sequential implementation of ECC and the standard elliptic curve(EC)form cannot achieve required performance level.Moreover,the widely used Hardware implementation of ECC is costly option and may be not affordable.This research aims to develop a high-performance parallel software implementation for ECC.To achieve this,many experiments were performed to examine several factors affecting ECC performance including the projective coordinates,the scalar multiplication algorithm,the elliptic curve(EC)form,and the parallel implementation.The ECC performance was analyzed using the different factors to tune-up them and select the best choices to increase the speed of the cryptosystem.Experimental results illustrated that parallel Montgomery ECC implementation using homogenous projection achieves the highest performance level,since it scored the shortest time delay for ECC computations.In addition,results showed thatNAF algorithm consumes less time to perform encryption and scalar multiplication operations in comparison withMontgomery ladder and binarymethods.Java multi-threading technique was adopted to implement ECC computations in parallel.The proposed multithreaded Montgomery ECC implementation significantly improves the performance level compared to previously presented parallel and sequential implementations. 展开更多
关键词 elliptic curve cryptosystem parallel software implementation MULTI-THREADING scalar multiplication algorithms modular arithmetic
下载PDF
A SECURE PROXY SIGNATURE SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM
11
作者 Hu Bin Jin Chenhui 《Journal of Electronics(China)》 2006年第1期54-57,共4页
Proxy signature is a special digital signature which enables a proxy signer to sign messages on behalf of the original signer. This paper proposes a strongly secure proxy signature scheme and a secure multi-proxy sign... Proxy signature is a special digital signature which enables a proxy signer to sign messages on behalf of the original signer. This paper proposes a strongly secure proxy signature scheme and a secure multi-proxy signature scheme based on elliptic curve cryptosystem. Contrast with universal proxy signature schemes, they are secure against key substitute attack even if there is not a certificate authority in the system, and also secure against the original signer's forgery attack. Furtherlnore, based on the elliptic curve cryptosystem, they are more efficient and have smaller key size than other system. They can be used in electronics transaction and mobile agent environment. 展开更多
关键词 Digital signature Proxy signature Multi-proxy signature elliptic curve cryptosystem
下载PDF
DEFENSE AGAINST COLLUSION SCHEME BASED ON ELLIPTIC CURVE CRYPTOGRAPHY FOR WIRELESS SENSOR NETWORKS
12
作者 Cheng Hongbing Huang Xiao Yang Geng 《Journal of Electronics(China)》 2009年第5期651-658,共8页
Wireless Sensor Networks (WSNs) are being deployed for a wide variety of applications and the security problems of them have received considerable attention. Considering the limitations of power, computation capabilit... Wireless Sensor Networks (WSNs) are being deployed for a wide variety of applications and the security problems of them have received considerable attention. Considering the limitations of power, computation capability and storage resources, this paper proposed an efficient defense against collusion scheme based on elliptic curve cryptography for wireless sensor networks in order to solve the problems that sensor node-key leaking and adversaries make compromised nodes as their collusions to launch new attack. In the proposed scheme, the group-key distribution strategy is employed to compute the private key of each sensor node, and the encryption and decryption algorithms are constructed based on Elliptic Curve Cryptography (ECC). The command center (node) only needs to broadcast a controlling header with three group elements, and the authorized sensor node can correctly recover the session key and use it to decrypt the broadcasting message. Analysis and proof of the proposed scheme's efficiency and security show that the proposed scheme can resist the k-collusion attack efficiently. 展开更多
关键词 Wireless Sensor Networks (WSNs) COLLUSION elliptic curve Cryptography ecc Security
下载PDF
A Controllable Proxy Digital Signature Scheme Based on Hyper-elliptic Curve Cryptosystem 被引量:2
13
作者 You 'an Xiao Zude Zhou 《通讯和计算机(中英文版)》 2006年第8期35-40,共6页
下载PDF
High performance elliptic curve point operations with pipelined GF(2m) field multiplier
14
作者 Turki F. Al-Somani Alaaeldin Amin 《通讯和计算机(中英文版)》 2009年第10期62-69,共8页
关键词 性能指标 椭圆曲线 流水线 乘数 吞吐量 乘法器 延迟模型 架构
下载PDF
Research on fast implementation of Elliptic Curve Cryptosystem based on object-oriented method
15
作者 SHEN Gui-cheng ZHENG Xue-feng 《通讯和计算机(中英文版)》 2007年第8期35-39,52,共6页
关键词 目标导向 有限元 椭圆曲线密码系统 信息安全
下载PDF
Software Implementation of Elliptic Curve Encryption over Binary Field
16
作者 ZHANG Xianfeng QIN Zhiguang ZHOU Shijie LIU Jinde(School of Computer Science and Engineering,UESTC Chengdu 610054 China) 《Journal of Electronic Science and Technology of China》 2003年第1期54-59,共6页
The mathematical theory for elliptic curve encryption based on optimal normal basis(ONB) over F_2~m is introduced.Then an elliptic curve cryptography(ECC) based encryption scheme isanalyzed and designed.The mechanism ... The mathematical theory for elliptic curve encryption based on optimal normal basis(ONB) over F_2~m is introduced.Then an elliptic curve cryptography(ECC) based encryption scheme isanalyzed and designed.The mechanism for key exchange based on Diffie-Hellman is described in detailsfor further applications.Based on these theoretic foundations,the software based on ECC is developedand an application is provided.The software is characterized by excellent security as well as highefficiency. 展开更多
关键词 network security elliptic curve cryptography(ecc) encryption software binary field
下载PDF
基于ECC的无线传感器网络密钥管理协议 被引量:10
17
作者 蹇波 郭永辉 +1 位作者 罗长远 李伟 《计算机工程》 CAS CSCD 北大核心 2010年第3期142-144,共3页
针对无线传感器网络在电量、计算能力和内存容量等方面的局限性,基于椭圆曲线密码体制,提出一种适用于无线传感器网络的密钥管理协议,给出通信密钥建立、新节点加入以及节点密钥更新与回收的实现过程。从协议的安全性、抗毁性和效能方... 针对无线传感器网络在电量、计算能力和内存容量等方面的局限性,基于椭圆曲线密码体制,提出一种适用于无线传感器网络的密钥管理协议,给出通信密钥建立、新节点加入以及节点密钥更新与回收的实现过程。从协议的安全性、抗毁性和效能方面进行性能分析,实验结果表明该协议具有较强的可扩展性与抵抗攻击能力。 展开更多
关键词 无线传感器网络 密钥管理 椭圆曲线密码体制 密钥回收
下载PDF
基于ECC的前向安全数字签名的研究与改进 被引量:6
18
作者 符茂胜 任哲 侯整风 《计算机工程》 EI CAS CSCD 北大核心 2006年第14期109-110,113,共3页
基于ECC的前向安全数字签名方案,签名中使用了不变量SK_i^(n^(T-i)),尽管签名私钥是前向安全性的,但实际上签名不具有前向安全性。该文提出了关联因子的概念,利用关联因子构造了一种新的基于ECC的前向安全数字签名方案,该方案不仅具有... 基于ECC的前向安全数字签名方案,签名中使用了不变量SK_i^(n^(T-i)),尽管签名私钥是前向安全性的,但实际上签名不具有前向安全性。该文提出了关联因子的概念,利用关联因子构造了一种新的基于ECC的前向安全数字签名方案,该方案不仅具有前向安全性,还具有较强的抗伪造性,有一定的理论和实用价值。 展开更多
关键词 椭圆曲线 前向安全 数字签名 密钥进化
下载PDF
基于智能卡的RSA与ECC算法的比较与实现 被引量:10
19
作者 刘淳 张凤元 张其善 《计算机工程与应用》 CSCD 北大核心 2007年第4期96-98,118,共4页
智能卡上的常用公钥算法为RSA和ECC算法。分别阐述了两者在带有加密协处理器的智能卡平台上的实现过程,包括RSA算法中模幂运算、模乘运算的实现;ECC算法中基域的选择、坐标系的选择、标量乘法和域算术运算的实现。并在Infineon的SLE66CL... 智能卡上的常用公钥算法为RSA和ECC算法。分别阐述了两者在带有加密协处理器的智能卡平台上的实现过程,包括RSA算法中模幂运算、模乘运算的实现;ECC算法中基域的选择、坐标系的选择、标量乘法和域算术运算的实现。并在Infineon的SLE66CLX系列智能卡芯片上实现了多种密钥长度的RSA和ECC算法,对两种算法的时间和空间效率进行了比较,根据比较结果指出了两者的优劣。 展开更多
关键词 智能卡 RSA ecc
下载PDF
一种基于门限ECC的入侵容忍CA方案 被引量:21
20
作者 张险峰 刘锦德 《计算机应用》 CSCD 北大核心 2004年第2期5-8,共4页
门限密码学提供了建立入侵容忍应用的新方法。文中在介绍并分析了基于ECC的ElGamal数字签名方案和t out of n秘密共享方案的基础上,提出了一个基于ECC的零知识证明方法和一个基于ECC的门限数字签名方案;研究了该方法和方案在建立入侵容... 门限密码学提供了建立入侵容忍应用的新方法。文中在介绍并分析了基于ECC的ElGamal数字签名方案和t out of n秘密共享方案的基础上,提出了一个基于ECC的零知识证明方法和一个基于ECC的门限数字签名方案;研究了该方法和方案在建立入侵容忍CA中的应用。最后,对比ITTC项目中关于入侵容忍CA设计的方案,分析显示该方案在安全性、效率和可用性方面具有良好的性能。 展开更多
关键词 入侵容忍 椭圆曲线密码体制(ecc) 门限数字签名 认证中心(CA)
下载PDF
上一页 1 2 30 下一页 到第
使用帮助 返回顶部