期刊文献+
共找到458篇文章
< 1 2 23 >
每页显示 20 50 100
A Controllable Proxy Digital Signature Scheme Based on Hyper-elliptic Curve Cryptosystem 被引量:2
1
作者 You 'an Xiao Zude Zhou 《通讯和计算机(中英文版)》 2006年第8期35-40,共6页
下载PDF
Remote sensing image encryption algorithm based on novel hyperchaos and an elliptic curve cryptosystem
2
作者 田婧希 金松昌 +2 位作者 张晓强 杨绍武 史殿习 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期292-304,共13页
Remote sensing images carry crucial ground information,often involving the spatial distribution and spatiotemporal changes of surface elements.To safeguard this sensitive data,image encryption technology is essential.... Remote sensing images carry crucial ground information,often involving the spatial distribution and spatiotemporal changes of surface elements.To safeguard this sensitive data,image encryption technology is essential.In this paper,a novel Fibonacci sine exponential map is designed,the hyperchaotic performance of which is particularly suitable for image encryption algorithms.An encryption algorithm tailored for handling the multi-band attributes of remote sensing images is proposed.The algorithm combines a three-dimensional synchronized scrambled diffusion operation with chaos to efficiently encrypt multiple images.Moreover,the keys are processed using an elliptic curve cryptosystem,eliminating the need for an additional channel to transmit the keys,thus enhancing security.Experimental results and algorithm analysis demonstrate that the algorithm offers strong security and high efficiency,making it suitable for remote sensing image encryption tasks. 展开更多
关键词 hyperchaotic system elliptic curve cryptosystem(ECC) 3D synchronous scrambled diffusion remote sensing image unmanned aerial vehicle(UAV)
下载PDF
Efficient Dynamic Threshold Group Signature Scheme Based on Elliptic Curve Cryptosystem 被引量:2
3
作者 夏祥胜 洪帆 +1 位作者 耿永军 崔国华 《Journal of Southwest Jiaotong University(English Edition)》 2008年第1期18-23,共6页
The short secret key characteristic of elliptic curve cryptosystem (ECC) are integrated with the ( t, n ) threshold method to create a practical threshold group signature scheme characterized by simultaneous signi... The short secret key characteristic of elliptic curve cryptosystem (ECC) are integrated with the ( t, n ) threshold method to create a practical threshold group signature scheme characterized by simultaneous signing. The scheme not only meets the requirements of anonymity and traceability of group signature but also can withstand Tseng and Wang's conspiracy attack. It allows the group manager to add new members and delete old members according to actual application, while the system parameters have a little change. Cryptanalysis result shows that the scheme is efficient and secure. 展开更多
关键词 Elliptic curve cryptosystem Group signature Threshold scheme Dynamic threshold group signature
下载PDF
Image encryption technique based on new two-dimensional fractional-order discrete chaotic map and Menezes–Vanstone elliptic curve cryptosystem 被引量:1
4
作者 Zeyu Liu Tiecheng Xia Jinbo Wang 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第3期161-176,共16页
We propose a new fractional two-dimensional triangle function combination discrete chaotic map(2D-TFCDM)with the discrete fractional difference.Moreover,the chaos behaviors of the proposed map are observed and the bif... We propose a new fractional two-dimensional triangle function combination discrete chaotic map(2D-TFCDM)with the discrete fractional difference.Moreover,the chaos behaviors of the proposed map are observed and the bifurcation diagrams,the largest Lyapunov exponent plot,and the phase portraits are derived,respectively.Finally,with the secret keys generated by Menezes-Vanstone elliptic curve cryptosystem,we apply the discrete fractional map into color image encryption.After that,the image encryption algorithm is analyzed in four aspects and the result indicates that the proposed algorithm is more superior than the other algorithms. 展开更多
关键词 CHAOS fractional two-dimensional triangle function combination discrete chaotic map image encryption Menezes-Vanstone elliptic curve cryptosystem
下载PDF
Secure Authentication of WLAN Based on Elliptic Curve Cryptosystem 被引量:1
5
作者 张龙军 韩玮 陈克非 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第5期645-650,共6页
The security of wireless local area network (WI.AN) becomes a bottleneck for its further applications. At present, many standard organizations and manufacturers of WLAN try to solve this problem. However, owing to t... The security of wireless local area network (WI.AN) becomes a bottleneck for its further applications. At present, many standard organizations and manufacturers of WLAN try to solve this problem. However, owing to the serious secure leak in IEEES02.11 standards, it is impossible to utterly solve the problem by simply adding some remedies. Based on the analysis on the security mechanism of WLAN and the latest techniques of WI.AN security, a solution to WLAN security was presented. The solution makes preparation for the further combination of WLAN and Internet. 展开更多
关键词 SECURITY wireless local area network (WLAN) elliptic curve cryptosystem
下载PDF
Improved Software Implementation for Montgomery Elliptic Curve Cryptosystem
6
作者 Mohammad Al-Khatib Wafaa Saif 《Computers, Materials & Continua》 SCIE EI 2022年第3期4847-4865,共19页
The last decade witnessed rapid increase in multimedia and other applications that require transmitting and protecting huge amount of data streams simultaneously.For such applications,a high-performance cryptosystem i... The last decade witnessed rapid increase in multimedia and other applications that require transmitting and protecting huge amount of data streams simultaneously.For such applications,a high-performance cryptosystem is compulsory to provide necessary security services.Elliptic curve cryptosystem(ECC)has been introduced as a considerable option.However,the usual sequential implementation of ECC and the standard elliptic curve(EC)form cannot achieve required performance level.Moreover,the widely used Hardware implementation of ECC is costly option and may be not affordable.This research aims to develop a high-performance parallel software implementation for ECC.To achieve this,many experiments were performed to examine several factors affecting ECC performance including the projective coordinates,the scalar multiplication algorithm,the elliptic curve(EC)form,and the parallel implementation.The ECC performance was analyzed using the different factors to tune-up them and select the best choices to increase the speed of the cryptosystem.Experimental results illustrated that parallel Montgomery ECC implementation using homogenous projection achieves the highest performance level,since it scored the shortest time delay for ECC computations.In addition,results showed thatNAF algorithm consumes less time to perform encryption and scalar multiplication operations in comparison withMontgomery ladder and binarymethods.Java multi-threading technique was adopted to implement ECC computations in parallel.The proposed multithreaded Montgomery ECC implementation significantly improves the performance level compared to previously presented parallel and sequential implementations. 展开更多
关键词 Elliptic curve cryptosystem parallel software implementation MULTI-THREADING scalar multiplication algorithms modular arithmetic
下载PDF
A SECURE PROXY SIGNATURE SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM
7
作者 Hu Bin Jin Chenhui 《Journal of Electronics(China)》 2006年第1期54-57,共4页
Proxy signature is a special digital signature which enables a proxy signer to sign messages on behalf of the original signer. This paper proposes a strongly secure proxy signature scheme and a secure multi-proxy sign... Proxy signature is a special digital signature which enables a proxy signer to sign messages on behalf of the original signer. This paper proposes a strongly secure proxy signature scheme and a secure multi-proxy signature scheme based on elliptic curve cryptosystem. Contrast with universal proxy signature schemes, they are secure against key substitute attack even if there is not a certificate authority in the system, and also secure against the original signer's forgery attack. Furtherlnore, based on the elliptic curve cryptosystem, they are more efficient and have smaller key size than other system. They can be used in electronics transaction and mobile agent environment. 展开更多
关键词 Digital signature Proxy signature Multi-proxy signature Elliptic curve cryptosystem
下载PDF
Research on fast implementation of Elliptic Curve Cryptosystem based on object-oriented method
8
作者 SHEN Gui-cheng ZHENG Xue-feng 《通讯和计算机(中英文版)》 2007年第8期35-39,52,共6页
关键词 目标导向 有限元 椭圆曲线密码系统 信息安全
下载PDF
Fault Attacks on Hyperelliptic Curve Discrete Logarithm Problem over Finite Fields 被引量:2
9
作者 Wang Mingqiang Xue Haiyang Zhan Tao 《China Communications》 SCIE CSCD 2012年第11期150-161,共12页
In this paper, we present two explicit invalid-curve attacks on the genus 2 hyperelliptic curve over a finite field. First, we propose two explicit attack models by injecting a one-bit fault in a given divisor. Then, ... In this paper, we present two explicit invalid-curve attacks on the genus 2 hyperelliptic curve over a finite field. First, we propose two explicit attack models by injecting a one-bit fault in a given divisor. Then, we discuss the construction of an invalid curve based on the faulted divisor. Our attacks are based on the fact that the Hyperelliptic Curve Scalar Multiplication (HECSM) algorithm does not utilize the curve parameters and We consider three hyperelliptic curves as the attack targets. For curve with security level 186 (in bits), our attack method can get the weakest invalid curve with security level 42 (in bits); there are 93 invalid curves with security level less than 50. We also estimate the theoretical probability of getting a weak hyperelliptic curve whose cardinality is a smooth integer. Finally, we show that the complexity of the fault attack is subexponential if the attacker can freely inject a fault in the input divisor. Cryptosystems based on the genus 2 hyperelliptic curves cannot work against our attack algorithm in practice. 展开更多
关键词 hyperelliptic curve discrete logarithm finite field GENUS cryptosystem
下载PDF
An FPGA Implementation of GF(p) Elliptic Curve Cryptographic Coprocessor 被引量:1
10
作者 LIUYu-zhen QINZhong-ping ZHANGHuan-guo 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期31-34,共4页
A GF(p) elliptic curve cryptographic coprocessor is proposed and implemented on Field Programmable Gate Array (FPGA). The focus of the coprocessor is on the most critical, complicated and time-consuming point multipli... A GF(p) elliptic curve cryptographic coprocessor is proposed and implemented on Field Programmable Gate Array (FPGA). The focus of the coprocessor is on the most critical, complicated and time-consuming point multiplications. The technique of coordinates conversion and fast multiplication algorithm of two large integers are utilized to avoid frequent inversions and to accelerate the field multiplications used in point multiplications. The characteristic of hardware parallelism is considered in the implementation of point multiplications. The coprocessor implemented on XILINX XC2V3000 computes a point multiplication for an arbitrary point on a curve defined over GF(2192?264?1) with the frequency of 10 MHz in 4.40 ms in the average case and 5.74 ms in the worst case. At the same circumstance, the coprocessor implemented on XILINX XC2V4000 takes 2.2 ms in the average case and 2.88 ms in the worst case. 展开更多
关键词 elliptic curve cryptosystems cryptographic coprocessor CRYPTOGRAPHY information security
下载PDF
An Efficient Method of Generating Parameters for Pairing-Based Cryptosystems
11
作者 WANG Maocai DAI Guangming PEN Lei ZHEN Chang QIN Ruijie 《China Communications》 SCIE CSCD 2010年第4期167-171,共5页
Efficient computation of Tate pairing is a crucial factor for practical applications of pairing-based cryptosystems(PBC).Recently,there have been many improvements for the computation of Tate pairing,which focuses on ... Efficient computation of Tate pairing is a crucial factor for practical applications of pairing-based cryptosystems(PBC).Recently,there have been many improvements for the computation of Tate pairing,which focuses on the arithmetical operations above the finite field.In this paper,we analyze the structure of Miller’s algorithm firstly,which is used to implement Tate pairing.Based on the characteristics that Miller’s algorithm will be improved tremendous if the order of the subgroup of elliptic curve group is low hamming prime,a new method for generating parameters for PBC is put forward,which enable it feasible that there is certain some subgroup of low hamming prime order in the elliptic curve group generated.Finally,we analyze the computation efficiency of Tate pairing using the new parameters for PBC and give the test result.It is clear that the computation of Tate pairing above the elliptic curve group generating by our method can be improved tremendously. 展开更多
关键词 Pairing-based cryptosystems Miller's Algorithm Tate Pairing Low Hamming Elliptic curve
下载PDF
High performance elliptic curve point operations with pipelined GF(2m) field multiplier
12
作者 Turki F. Al-Somani Alaaeldin Amin 《通讯和计算机(中英文版)》 2009年第10期62-69,共8页
关键词 性能指标 椭圆曲线 流水线 乘数 吞吐量 乘法器 延迟模型 架构
下载PDF
空间信息网络公钥管理方案的设计与分析
13
作者 杨静春 陈韬鸣 +2 位作者 蒋鑫 徐松艳 张道法 《遥测遥控》 2024年第5期50-57,共8页
为保障空间信息网络认证与密钥分发的安全性,本文提出了一种基于椭圆曲线密码系统的公钥管理方案,提供入网认证、密钥协商和密钥更新等功能,实现了认证性、抗重放和前向/后向安全性等多种安全目标。对于卫星间的认证和密钥协商,本方案... 为保障空间信息网络认证与密钥分发的安全性,本文提出了一种基于椭圆曲线密码系统的公钥管理方案,提供入网认证、密钥协商和密钥更新等功能,实现了认证性、抗重放和前向/后向安全性等多种安全目标。对于卫星间的认证和密钥协商,本方案仅需卫星之间进行3次交互即可完成。通过对方案进行安全性和效率分析,证实了本方案在空间信息网络中的实际可用性以及同现有公钥管理方案相比效率上的优越性。 展开更多
关键词 空间信息网络 公钥管理 认证和密钥协商 椭圆曲线密码系统
下载PDF
椭圆曲线加密系统的性能分析 被引量:36
14
作者 张险峰 秦志光 刘锦德 《电子科技大学学报》 EI CAS CSCD 北大核心 2001年第2期144-147,共4页
对比其他公钥系统,分析了椭圆曲线加密系统(ECC)的安全性和有效性;说明了ECC与其他公钥加密系统相比,能提供更好的加密强度、更快的执行速度和更小的密钥长度,因此可用较小的开销和时延实现较高的安全性,能满足在带宽、计算能力或... 对比其他公钥系统,分析了椭圆曲线加密系统(ECC)的安全性和有效性;说明了ECC与其他公钥加密系统相比,能提供更好的加密强度、更快的执行速度和更小的密钥长度,因此可用较小的开销和时延实现较高的安全性,能满足在带宽、计算能力或存储能力等受限的应用场合。 展开更多
关键词 公钥体制 椭圆曲线加密系统 密码学
下载PDF
基于椭圆曲线的数字签名与盲签名 被引量:63
15
作者 张方国 王常杰 王育民 《通信学报》 EI CSCD 北大核心 2001年第8期22-28,共7页
椭圆曲线数字签名实际上是基于乘法群的离散对数的数字签名在椭圆曲线上的模拟。本文描述了由ANSI(1999)颁布的椭圆曲线数字签名算法(ECDSA)标准,提出了三个新的基于椭圆曲线的数字签名方案和两个盲签名方案。
关键词 椭圆曲线 密码体制 数字签名 盲签名
下载PDF
椭圆曲线离散对数的攻击现状 被引量:19
16
作者 张方国 陈晓峰 王育民 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2002年第3期398-403,共6页
椭圆曲线密码的数学基础是基于椭圆曲线上的有理点构成的Abelian加法群构造的离散对数问题 .讨论了椭圆曲线离散对数问题及其常用的理论攻击方法 ,分析了一些特殊曲线的攻击方法及最近的提出的一个新攻击方法———WeilDescent攻击 (或... 椭圆曲线密码的数学基础是基于椭圆曲线上的有理点构成的Abelian加法群构造的离散对数问题 .讨论了椭圆曲线离散对数问题及其常用的理论攻击方法 ,分析了一些特殊曲线的攻击方法及最近的提出的一个新攻击方法———WeilDescent攻击 (或GHS攻击 ) ,给出了椭圆曲线离散对数的实际攻击———软件攻击和硬件攻击现状 . 展开更多
关键词 椭圆曲线 密码 离散对数 攻击 现状 CHS攻击
下载PDF
椭圆曲线公钥密码体制的研究热点综述 被引量:24
17
作者 张雁 林英 郝林 《计算机工程》 CAS CSCD 北大核心 2004年第3期127-129,共3页
椭圆曲线密码体制是公钥密码中的研究热点。该文介绍了椭圆曲线密码体制的基本概念及相关知识,讨论了目前基于椭圆离散对数问题的椭圆曲线密码的研究动态,并指出今后的研究方向和重点。
关键词 椭圆曲线密码体制 椭圆曲线离散对数问题 椭圆曲线 倍乘
下载PDF
素域上椭圆曲线密码的高效实现 被引量:13
18
作者 汪朝晖 陈建华 +1 位作者 涂航 李莉 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2004年第3期335-338,共4页
给出了几个素域上的算术运算和素域上椭圆曲线算术运算的高效实现算法,从而解决了椭圆曲线密码(ECC)实现中影响效率的几个关键算法设计问题,且就ECC加密机制和签名机制的选择提出了建议,最终形成一套高效的素域上ECC加密算法和签名算法... 给出了几个素域上的算术运算和素域上椭圆曲线算术运算的高效实现算法,从而解决了椭圆曲线密码(ECC)实现中影响效率的几个关键算法设计问题,且就ECC加密机制和签名机制的选择提出了建议,最终形成一套高效的素域上ECC加密算法和签名算法的实现方案.该方案适应多种软件和硬件实现条件,具有较好的通用性. 展开更多
关键词 椭圆曲线密码 加密 签名
下载PDF
GF(p)上安全椭圆曲线及其基点的选取 被引量:16
19
作者 张方国 王常杰 王育民 《电子与信息学报》 EI CSCD 北大核心 2002年第3期377-381,共5页
椭圆曲线密码体制的研究与实现已逐渐成为公钥密码体制研究的主流,适用于密码的安全椭圆曲线及其基点的选取,是椭圆曲线密码实现的基础。在该文中,作者讨论了大素数域上的安全椭圆曲线的选取算法和基点的选取,并借助于MIRACL系统利用标... 椭圆曲线密码体制的研究与实现已逐渐成为公钥密码体制研究的主流,适用于密码的安全椭圆曲线及其基点的选取,是椭圆曲线密码实现的基础。在该文中,作者讨论了大素数域上的安全椭圆曲线的选取算法和基点的选取,并借助于MIRACL系统利用标准C语言对它们成功实现。 展开更多
关键词 椭圆曲线密码体制 安全曲线 基点 保密通信
下载PDF
椭圆曲线签名方案 被引量:10
20
作者 罗皓 乔秦宝 +1 位作者 刘金龙 黄双庆 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2003年第1期95-98,共4页
将椭圆曲线密码系统 (ECC)与ElGamal系统进行了比较 ,在保证签名算法安全性的前提下 ,对ECC签名方案中的求逆运算和消息恢复问题进行了优化 ,针对这两个问题分别构造了新的签名方案 ,通过理论证明和编程模拟实验 ,解决了ECC签名方案中... 将椭圆曲线密码系统 (ECC)与ElGamal系统进行了比较 ,在保证签名算法安全性的前提下 ,对ECC签名方案中的求逆运算和消息恢复问题进行了优化 ,针对这两个问题分别构造了新的签名方案 ,通过理论证明和编程模拟实验 ,解决了ECC签名方案中存在的需要求逆运算和不能实现消息恢复的问题 。 展开更多
关键词 椭圆曲线密码系统 签名方程 求逆运算 消息恢复 ElGamal系统 数据安全 密码学
下载PDF
上一页 1 2 23 下一页 到第
使用帮助 返回顶部