期刊文献+
共找到2,288篇文章
< 1 2 115 >
每页显示 20 50 100
Sensitive Information Security Based on Elliptic Curves
1
作者 Nadine Nibigira Vincent Havyarimana Zhu Xiao 《World Journal of Engineering and Technology》 2024年第2期274-285,共12页
The elliptic curve cryptography algorithm represents a major advancement in the field of computer security. This innovative algorithm uses elliptic curves to encrypt and secure data, providing an exceptional level of ... The elliptic curve cryptography algorithm represents a major advancement in the field of computer security. This innovative algorithm uses elliptic curves to encrypt and secure data, providing an exceptional level of security while optimizing the efficiency of computer resources. This study focuses on how elliptic curves cryptography helps to protect sensitive data. Text is encrypted using the elliptic curve technique because it provides great security with a smaller key on devices with limited resources, such as mobile phones. The elliptic curves cryptography of this study is better than using a 256-bit RSA key. To achieve equivalent protection by using the elliptic curves cryptography, several Python libraries such as cryptography, pycryptodome, pyQt5, secp256k1, etc. were used. These technologies are used to develop a software based on elliptic curves. If built, the software helps to encrypt and decrypt data such as a text messages and it offers the authentication for the communication. 展开更多
关键词 CRYPTOGRAPHY elliptic curves Digital Security Data Sensitive Data IMPLEMENTATION
下载PDF
Remote sensing image encryption algorithm based on novel hyperchaos and an elliptic curve cryptosystem
2
作者 田婧希 金松昌 +2 位作者 张晓强 杨绍武 史殿习 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期292-304,共13页
Remote sensing images carry crucial ground information,often involving the spatial distribution and spatiotemporal changes of surface elements.To safeguard this sensitive data,image encryption technology is essential.... Remote sensing images carry crucial ground information,often involving the spatial distribution and spatiotemporal changes of surface elements.To safeguard this sensitive data,image encryption technology is essential.In this paper,a novel Fibonacci sine exponential map is designed,the hyperchaotic performance of which is particularly suitable for image encryption algorithms.An encryption algorithm tailored for handling the multi-band attributes of remote sensing images is proposed.The algorithm combines a three-dimensional synchronized scrambled diffusion operation with chaos to efficiently encrypt multiple images.Moreover,the keys are processed using an elliptic curve cryptosystem,eliminating the need for an additional channel to transmit the keys,thus enhancing security.Experimental results and algorithm analysis demonstrate that the algorithm offers strong security and high efficiency,making it suitable for remote sensing image encryption tasks. 展开更多
关键词 hyperchaotic system elliptic curve cryptosystem(ECC) 3D synchronous scrambled diffusion remote sensing image unmanned aerial vehicle(UAV)
下载PDF
Elliptic Curves of Twin—Primes Over Gauss Field and Diophantin … 被引量:13
3
作者 邱德荣 张贤科 《数学进展》 CSCD 北大核心 2000年第3期279-281,共3页
关键词 DIOPHANTINE equntions elliptic curves GAUSS
下载PDF
Cryptanalysis and Improvement of Signcryption Schemes on Elliptic Curves 被引量:2
4
作者 LIXiang-xue CHENKe-fei LIShi-qun 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期231-234,共4页
In this paper, we analyze two signcryption schemes on elliptic curves proposed by Zheng Yu-liang and Hideki Imai. We point out a serious problem with the schemes that the elliptic curve based signcryption schemes lose... In this paper, we analyze two signcryption schemes on elliptic curves proposed by Zheng Yu-liang and Hideki Imai. We point out a serious problem with the schemes that the elliptic curve based signcryption schemes lose confidentiality to gain non-repudiation. We also propose two improvement versions that not only overcome the security leak inherent in the schemes but also provide public verifiability or forward security. Our improvement versions require smaller computing cost than that required by signature-then-encryption methods. 展开更多
关键词 SIGNCRYPTION elliptic curve CRYPTANALYSIS
下载PDF
Text Encryption Using Pell Sequence and Elliptic Curves with Provable Security 被引量:1
5
作者 Sumaira Azhar Naveed Ahmed Azam Umar Hayat 《Computers, Materials & Continua》 SCIE EI 2022年第6期4971-4988,共18页
The demand for data security schemes has increased with the significant advancement in the field of computation and communication networks.We propose a novel three-step text encryption scheme that has provable securit... The demand for data security schemes has increased with the significant advancement in the field of computation and communication networks.We propose a novel three-step text encryption scheme that has provable security against computation attacks such as key attack and statistical attack.The proposed scheme is based on the Pell sequence and elliptic curves,where at the first step the plain text is diffused to get a meaningless plain text by applying a cyclic shift on the symbol set.In the second step,we hide the elements of the diffused plain text from the attackers.For this purpose,we use the Pell sequence,a weight function,and a binary sequence to encode each element of the diffused plain text into real numbers.The encoded diffused plain text is then confused by generating permutations over elliptic curves in the third step.We show that the proposed scheme has provable security against key sensitivity attack and statistical attacks.Furthermore,the proposed scheme is secure against key spacing attack,ciphertext only attack,and known-plaintext attack.Compared to some of the existing text encryption schemes,the proposed scheme is highly secure against modern cryptanalysis. 展开更多
关键词 Text encryption pell numbers elliptic curves key sensitivity statistical cryptanalysis
下载PDF
Binary Sequences from a Pair of Elliptic Curves
6
作者 CHEN Zhixiong ZHANG Ning XIAO Guozhen 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1511-1515,共5页
A family of binary sequences were constructed by using an elliptic curve and its twisted curves over finite fields. It was shown that these sequences possess "good" cryptographie properties of 0-1 distribution, long... A family of binary sequences were constructed by using an elliptic curve and its twisted curves over finite fields. It was shown that these sequences possess "good" cryptographie properties of 0-1 distribution, long period and large linear complexity. The results indicate that such se quences provide strong potential applications in cryptography. 展开更多
关键词 pseudo-random sequences elliptic curves stream ciphers elliptic curve cryptography
下载PDF
Computation of Complex Primes Using Elliptic Curves: Application for Cryptosystem Design
7
作者 Boris S. Verkhovsky 《International Journal of Communications, Network and System Sciences》 2012年第1期1-6,共6页
This paper provides several generalizations of Gauss theorem that counts points on special elliptic curves. It is demonstrated how to implement these generalizations for computation of complex primes, which are applic... This paper provides several generalizations of Gauss theorem that counts points on special elliptic curves. It is demonstrated how to implement these generalizations for computation of complex primes, which are applicable in several protocols providing security in communication networks. Numerical examples illustrate the ideas discussed in this paper. 展开更多
关键词 Communication Security GAUSS Formula COMPLEX PRIMES Points COUNTING Modular elliptic curve Applets Dual elliptic curves
下载PDF
Constructing quasi-random subsets of Z_N by using elliptic curves
8
作者 LIN Zhi-xing CHEN Zhi-xiong 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2012年第1期105-113,共9页
Let ε : y^2 = x3 + Ax + B be an elliptic curve defined over the finite field Zp(p 〉 3) and G be a rational point of prime order N on ε. Define a subset of ZN, the residue class ring modulo N, asS:={n:n∈ZN,n... Let ε : y^2 = x3 + Ax + B be an elliptic curve defined over the finite field Zp(p 〉 3) and G be a rational point of prime order N on ε. Define a subset of ZN, the residue class ring modulo N, asS:={n:n∈ZN,n≠0,(X(nG)/p)=1} where X(nG) denotes the x-axis of the rational points nC and (*/P) is the Legendre symbol. Some explicit results on quasi-randomness of S are investigated. The construction depends on the intrinsic group structures of elliptic curves and character sums along elliptic curves play an important role in the proofs. 展开更多
关键词 elliptic curve quasi-random subset quasi-randomness character sum Legendre symbol.
下载PDF
An Algebraic Proof of the Associative Law of Elliptic Curves
9
作者 Kazuyuki Fujii Hiroshi Oike 《Advances in Pure Mathematics》 2017年第12期649-659,共11页
In this paper we revisit the addition of elliptic curves and give an algebraic proof to the associative law by use of MATHEMATICA. The existing proofs of the associative law are rather complicated and hard to understa... In this paper we revisit the addition of elliptic curves and give an algebraic proof to the associative law by use of MATHEMATICA. The existing proofs of the associative law are rather complicated and hard to understand for beginners. An ‘‘elementary” proof to it based on algebra has not been given as far as we know. Undergraduates or non-experts can master the addition of elliptic curves through this paper. After mastering it they should challenge the elliptic curve cryptography. 展开更多
关键词 elliptic curvE Addition ASSOCIATIVE Law MATHEMATICA elliptic curvE CRYPTOGRAPHY
下载PDF
On the Torsion Subgroups of Certain Elliptic Curves over Q
10
作者 Yoon Kyung Park 《Advances in Pure Mathematics》 2013年第2期304-308,共5页
Let E be an elliptic curve over a given number field . By Mordell’s Theorem, the torsion subgroup of E defined over Q is a finite group. Using Lutz-Nagell Theorem, we explicitly calculate the torsion subgroup E(Q)tor... Let E be an elliptic curve over a given number field . By Mordell’s Theorem, the torsion subgroup of E defined over Q is a finite group. Using Lutz-Nagell Theorem, we explicitly calculate the torsion subgroup E(Q)tors for certain elliptic curves depending on their coefficients. 展开更多
关键词 elliptic curvE RATIONAL POINT
下载PDF
On Two Problems About Isogenies of Elliptic Curves Over Finite Fields
11
作者 Lixia Luo Guanju Xiao Yingpu Deng 《Communications in Mathematical Research》 CSCD 2020年第4期460-488,共29页
Isogenies occur throughout the theory of elliptic curves.Recently,the cryptographic protocols based on isogenies are considered as candidates of quantum-resistant cryptographic protocols.Given two elliptic curves E1,E... Isogenies occur throughout the theory of elliptic curves.Recently,the cryptographic protocols based on isogenies are considered as candidates of quantum-resistant cryptographic protocols.Given two elliptic curves E1,E2 defined over a finite field k with the same trace,there is a nonconstant isogeny b from E2 to E1 defined over k.This study gives out the index of Homk(E1,E2)b as a nonzero left ideal in Endk(E2)and figures out the correspondence between isogenies and kernel ideals.In addition,some results about the non-trivial minimal degree of isogenies between two elliptic curves are also provided. 展开更多
关键词 elliptic curve isogeny kernel ideal minimal degree
下载PDF
Cryptographic Schemes Based on Elliptic Curves over the Ring Zp[i]
12
作者 Manoj Kumar Pratik Gupta 《Applied Mathematics》 2016年第3期304-312,共9页
Elliptic Curve Cryptography recently gained a lot of attention in industry. The principal attraction of ECC compared to RSA is that it offers equal security for a smaller key size. The present paper includes the study... Elliptic Curve Cryptography recently gained a lot of attention in industry. The principal attraction of ECC compared to RSA is that it offers equal security for a smaller key size. The present paper includes the study of two elliptic curve and defined over the ring where . After showing isomorphism between and , we define a composition operation (in the form of a mapping) on their union set. Then we have discussed our proposed cryptographic schemes based on the elliptic curve . We also illustrate the coding of points over E, secret key exchange and encryption/decryption methods based on above said elliptic curve. Since our proposed schemes are based on elliptic curve of the particular type, therefore the proposed schemes provides a highest strength-per-bit of any cryptosystem known today with smaller key size resulting in faster computations, lower power assumption and memory. Another advantage is that authentication protocols based on ECC are secure enough even if a small key size is used. 展开更多
关键词 elliptic curve RING Finite Field ISOMORPHISM CARDINALITY ENCRYPTION/DECRYPTION
下载PDF
SPEED UP RATIONAL POINT SCALAR MULTIPLICATIONS ON ELLIPTIC CURVES BY FROBENIUS EQUATIONS
13
作者 You Lin Zhao Junzhong Xu Maozhi 《Journal of Electronics(China)》 2006年第1期58-63,共6页
Let q be a power of a prime and φ be the Frobenius endomorphism on E(Fqk), then q = tφ - φ^2. Applying this equation, a new algorithm to compute rational point scalar multiplications on elliptic curves by finding... Let q be a power of a prime and φ be the Frobenius endomorphism on E(Fqk), then q = tφ - φ^2. Applying this equation, a new algorithm to compute rational point scalar multiplications on elliptic curves by finding a suitable small positive integer s such that q^s can be represented as some very sparse φ-polynomial is proposed. If a Normal Basis (NB) or Optimal Normal Basis (ONB) is applied and the precomputations are considered free, our algorithm will cost, on average, about 55% to 80% less than binary method, and about 42% to 74% less than φ-ary method. For some elliptic curves, our algorithm is also taster than Mǖller's algorithm. In addition, an effective algorithm is provided for finding such integer s. 展开更多
关键词 elliptic curve Point scalar multiplication Frobenius equation q-ary method φ-polynomial
下载PDF
On Elliptic Curves with Everywhere Good Reduction over Certain Number Fields
14
作者 Shun’ichi Yokoyama 《American Journal of Computational Mathematics》 2012年第4期358-366,共9页
We prove the existence and nonexistence of elliptic curves having good reduction everywhere over certain real quadratic fields Q(m) for m≤200. These results of computations give best-possible data including structure... We prove the existence and nonexistence of elliptic curves having good reduction everywhere over certain real quadratic fields Q(m) for m≤200. These results of computations give best-possible data including structures of Mordell-Weil groups over some real quadratic fields via two-descent. We also prove similar results for the case of certain cubic fields. Especially, we give the first example of elliptic curve having everywhere good reduction over a pure cubic field using our method. 展开更多
关键词 elliptic curves OVER Number Fields Mordell-Weil Group Two-Descent
下载PDF
Secure and efficient elliptic curve cryptography resists side-channel attacks 被引量:8
15
作者 Zhang Tao Fan Mingyu Zheng Xiaoyu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第3期660-665,共6页
An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNA... An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNAF) algorithm is proposed to secure ECC scalar multiplication from these attacks. This algorithm adopts the fractional window method and probabilistic SPA scheme to reconfigure the pre-computed table, and it allows designers to make a dynamic configuration on pre-computed table. And then, it is enhanced to resist SPA, DPA, RPA and ZPA attacks by using the random masking method. Compared with the WBRIP and EBRIP methods, our proposals has the lowest total computation cost and reduce the shake phenomenon due to sharp fluctuation on computation performance. 展开更多
关键词 elliptic curve cryptography side channel attack simple power attack differential power attack refined power analysis zero-point power analysis.
下载PDF
Addition Sequence Method of Scalar Multiplication of Elliptic Curve over OEF 被引量:2
16
作者 LIUDuo DAIYi-qi 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期174-178,共5页
A new elliptic curve scalar multiplication algorithm is proposed. Thealgorithm uses the Frobenius map on optimal extension field (OEF) and addition sequence We introducea new algorithm on generating addition sequence ... A new elliptic curve scalar multiplication algorithm is proposed. Thealgorithm uses the Frobenius map on optimal extension field (OEF) and addition sequence We introducea new algorithm on generating addition sequence efficiently and also give some analysis about it.Based on this algorithm, a new method of computing scalar multiplication of elliptic curve over anOEF is presented. The new method is more efficient than the traditional scalar multiplicationalgorithms of elliptic curve over OEF. Thecomparisons of traditional method and the new method arealso given. 展开更多
关键词 CRYPTOLOGY elliptic curve optimal extension field FROBENIUS additionsequence
下载PDF
Integral Points on a Class of Elliptic Curve 被引量:2
17
作者 ZHU Huilin CHEN Jianhua 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第3期477-480,共4页
We prove all integral points of the elliptic curve y^2=x^2-30x+133 are (x,y) = (-7,0),(-3,±14),(2, ±9),(6,±13), (5143326,±11664498677), by using the method of algebraic number theory a... We prove all integral points of the elliptic curve y^2=x^2-30x+133 are (x,y) = (-7,0),(-3,±14),(2, ±9),(6,±13), (5143326,±11664498677), by using the method of algebraic number theory and p-adic analysis. Furthermore, we develop a computation method to find all integral points on a class of elliptic curve y^2= (x+α)(x^2-α)(x^2-αx+b) ,α ,b∈Z,α^2〈4b and find all integer solutions of hyperelliptic Diophantine equation Dy^2=Ax^4 + Bx^2 +C,B^2〈4AC. 展开更多
关键词 Diophantine equation elliptic curve fundamental unit algebraic number factorization p-adic analysis method
下载PDF
Verifiable (t, n) Threshold Signature Scheme Based on Elliptic Curve 被引量:1
18
作者 WANGHua-qun ZHAOJun-xi ZHANGLi-jun 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期165-168,共4页
Based on tht difficulty of solving the ECDLP (elliptic curve discretelogarithm problem) on the finite field, we present a (t, n) threshold signature scheme and averifiable key agreement scheme without trusted party. A... Based on tht difficulty of solving the ECDLP (elliptic curve discretelogarithm problem) on the finite field, we present a (t, n) threshold signature scheme and averifiable key agreement scheme without trusted party. Applying a modified elliptic curve signatureequation, we gel a more efficient signature scheme than the existing ECDSA (elliptic curve digitalsignature algorithm) from the computability and security view. Our scheme has a shorter key, fastercomputation, and better security. 展开更多
关键词 threshold signature secret sharing elliptic curve elliptic curve discretelogarithm
下载PDF
RGB Based Multiple Share Creation in Visual Cryptography with Aid of Elliptic Curve Cryptography 被引量:1
19
作者 K.Shankar P.Eswaran 《China Communications》 SCIE CSCD 2017年第2期118-130,共13页
In visual cryptography, many shares are generated which are illogical containing certain message within themselves. When all shares are piled jointly, they tend to expose the secret of the image. The notion of visual ... In visual cryptography, many shares are generated which are illogical containing certain message within themselves. When all shares are piled jointly, they tend to expose the secret of the image. The notion of visual secret sharing scheme is to encrypt a secret image into n illogical share images. It is unable to reveal any data on the original image if at least one of the shares is not achieved. The original image, in fact, is realized by overlapping the entire shares directly, in order that the human visual system is competent to identify the collective secret image without employing any complicated computational tools. Therefore, they are communicated steadily as number of shares. The elliptic curve cryptography approach, in turn, is employed to augment the privacy and safety of the image. The new.fangled technique is utilized to generate the multiple shares which are subjected to encryption and decryption by means of the elliptic curve cryptography technique. The test outcomes have revealed the fact that the peak signal to noise ratio is 58.0025, Mean square error value is 0.1164 and the correlation coefficient is 1 for the decrypted image without any sort of distortion of the original image. 展开更多
关键词 visual cryptography PIXEL SHARES elliptic curve cryptography ENCRYPTION PSNR mean square error
下载PDF
Elliptic Curve Scalar Multiplication with x-Coordinate 被引量:1
20
作者 ZHANG Ning PEI Qingqi XIAO Guozhen 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期163-166,共4页
This paper gives a comprehensive method to do Elliptic Curve Scalar Multiplication with only x-coordinate. Explicit point operation formulae for all types of defining equations of the curves are derived. For each type... This paper gives a comprehensive method to do Elliptic Curve Scalar Multiplication with only x-coordinate. Explicit point operation formulae for all types of defining equations of the curves are derived. For each type of curve, the performance is analyzed. The formulae are applied in Montgomery Ladder to get scalar multiplication algorithm operated with only x-coordinate. The new scalar multiplication has the same security level and computation amount with protected binary scalar multiplication (PBSM) against side channel attack, and has the advantages of higher security and little memory needed. 展开更多
关键词 elliptic curve scalar multiplication Montgomery ladder x-coordinate
下载PDF
上一页 1 2 115 下一页 到第
使用帮助 返回顶部