期刊文献+
共找到195篇文章
< 1 2 10 >
每页显示 20 50 100
SPEED UP RATIONAL POINT SCALAR MULTIPLICATIONS ON ELLIPTIC CURVES BY FROBENIUS EQUATIONS
1
作者 You Lin Zhao Junzhong Xu Maozhi 《Journal of Electronics(China)》 2006年第1期58-63,共6页
Let q be a power of a prime and φ be the Frobenius endomorphism on E(Fqk), then q = tφ - φ^2. Applying this equation, a new algorithm to compute rational point scalar multiplications on elliptic curves by finding... Let q be a power of a prime and φ be the Frobenius endomorphism on E(Fqk), then q = tφ - φ^2. Applying this equation, a new algorithm to compute rational point scalar multiplications on elliptic curves by finding a suitable small positive integer s such that q^s can be represented as some very sparse φ-polynomial is proposed. If a Normal Basis (NB) or Optimal Normal Basis (ONB) is applied and the precomputations are considered free, our algorithm will cost, on average, about 55% to 80% less than binary method, and about 42% to 74% less than φ-ary method. For some elliptic curves, our algorithm is also taster than Mǖller's algorithm. In addition, an effective algorithm is provided for finding such integer s. 展开更多
关键词 elliptic curve Point scalar multiplication Frobenius equation q-ary method φ-polynomial
下载PDF
Elliptic Curve Scalar Multiplication with x-Coordinate 被引量:1
2
作者 ZHANG Ning PEI Qingqi XIAO Guozhen 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期163-166,共4页
This paper gives a comprehensive method to do Elliptic Curve Scalar Multiplication with only x-coordinate. Explicit point operation formulae for all types of defining equations of the curves are derived. For each type... This paper gives a comprehensive method to do Elliptic Curve Scalar Multiplication with only x-coordinate. Explicit point operation formulae for all types of defining equations of the curves are derived. For each type of curve, the performance is analyzed. The formulae are applied in Montgomery Ladder to get scalar multiplication algorithm operated with only x-coordinate. The new scalar multiplication has the same security level and computation amount with protected binary scalar multiplication (PBSM) against side channel attack, and has the advantages of higher security and little memory needed. 展开更多
关键词 elliptic curve scalar multiplication Montgomery ladder x-coordinate
下载PDF
Efficient Scalar Multiplication for Elliptic Curves over Binary Fields
3
作者 GU Haihua GU Dawu LIU Ya 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期717-720,共4页
Scalar multiplication [n]P is the kernel and the most time-consuming operation in elliptic curve cryptosystems. In order to improve scalar multiplication, in this paper, we propose a tripling algorithm using Lopez and... Scalar multiplication [n]P is the kernel and the most time-consuming operation in elliptic curve cryptosystems. In order to improve scalar multiplication, in this paper, we propose a tripling algorithm using Lopez and Dahab projective coordinates, in which there are 3 field multiplications and 3 field squarings less than that in the Jacobian projective tripling algorithm. Furthermore, we map P to(φε^-1(P), and compute [n](φε^-1(P) on elliptic curve Eε, which is faster than computing [n]P on E, where φε is an isomorphism. Finally we calculate (φε([n]φε^-1(P)) = [n]P. Combined with our efficient point tripling formula, this method leads scalar multiplication using double bases to achieve about 23% improvement, compared with Jacobian projective coordinates. 展开更多
关键词 elliptic curve cryptosystem scalar multiplication double-base number system projective coordinates
原文传递
Improved Software Implementation for Montgomery Elliptic Curve Cryptosystem
4
作者 Mohammad Al-Khatib Wafaa Saif 《Computers, Materials & Continua》 SCIE EI 2022年第3期4847-4865,共19页
The last decade witnessed rapid increase in multimedia and other applications that require transmitting and protecting huge amount of data streams simultaneously.For such applications,a high-performance cryptosystem i... The last decade witnessed rapid increase in multimedia and other applications that require transmitting and protecting huge amount of data streams simultaneously.For such applications,a high-performance cryptosystem is compulsory to provide necessary security services.Elliptic curve cryptosystem(ECC)has been introduced as a considerable option.However,the usual sequential implementation of ECC and the standard elliptic curve(EC)form cannot achieve required performance level.Moreover,the widely used Hardware implementation of ECC is costly option and may be not affordable.This research aims to develop a high-performance parallel software implementation for ECC.To achieve this,many experiments were performed to examine several factors affecting ECC performance including the projective coordinates,the scalar multiplication algorithm,the elliptic curve(EC)form,and the parallel implementation.The ECC performance was analyzed using the different factors to tune-up them and select the best choices to increase the speed of the cryptosystem.Experimental results illustrated that parallel Montgomery ECC implementation using homogenous projection achieves the highest performance level,since it scored the shortest time delay for ECC computations.In addition,results showed thatNAF algorithm consumes less time to perform encryption and scalar multiplication operations in comparison withMontgomery ladder and binarymethods.Java multi-threading technique was adopted to implement ECC computations in parallel.The proposed multithreaded Montgomery ECC implementation significantly improves the performance level compared to previously presented parallel and sequential implementations. 展开更多
关键词 elliptic curve cryptosystem parallel software implementation MULTI-THREADING scalar multiplication algorithms modular arithmetic
下载PDF
Design of highly efficient elliptic curve crypto-processor with two multiplications over GF(2^(163))
5
作者 DAN Yong-ping ZOU Xue-cheng +2 位作者 LIU Zheng-lin HAN Yu YI Li-hua 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2009年第2期72-79,共8页
In this article, a parallel hardware processor is presented to compute elliptic curve scalar multiplication in polynomial basis representation. The processor is applicable to the operations of scalar multiplication by... In this article, a parallel hardware processor is presented to compute elliptic curve scalar multiplication in polynomial basis representation. The processor is applicable to the operations of scalar multiplication by using a modular arithmetic logic unit (MALU). The MALU consists of two multiplications, one addition, and one squaring. The two multiplications and the addition or squaring can be computed in parallel. The whole computations of scalar multiplication over GF(2^163) can be performed in 3 064 cycles. The simulation results based on Xilinx Virtex2 XC2V6000 FPGAs show that the proposed design can compute random GF(2^163) elliptic curve scalar multiplication operations in 31.17 μs, and the resource occupies 3 994 registers and 15 527 LUTs, which indicates that the crypto-processor is suitable for high-performance application. 展开更多
关键词 elliptic curve cryptography scalar multiplication finite field parallel design high performance
原文传递
Elliptic Curves in Huff's Model 被引量:1
6
作者 WU Hongfeng FENG Rongquan 《Wuhan University Journal of Natural Sciences》 CAS 2012年第6期473-480,共8页
In this paper,we present the generalized Huff curves that contain Huff's model as a special case.First,it is proved that every elliptic curve with three points of order 2 is isomorphic to a generalized Huff curve.The... In this paper,we present the generalized Huff curves that contain Huff's model as a special case.First,it is proved that every elliptic curve with three points of order 2 is isomorphic to a generalized Huff curve.Then,the fast and explicit formulae are derived for generalized Huff curves in projective coordinates.This paper also enumerates the number of isomorphism classes of generalized Huff curves over finite fields.Finally,the explicit formulae are presented for the doubling step and addition step in Miller's algorithm to compute the Tate pairing on generalized Huff elliptic curves. 展开更多
关键词 elliptic curve Huff curve CRYPTOGRAPHY scalar multiplication isomorphism classes
原文传递
High-performance hardware architecture of elliptic curve cryptography processor over GF(2^(163))
7
作者 Yong-ping DAN Xue-cheng ZOU +2 位作者 Zheng-lin LIU Yu HAN Li-hua YI 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2009年第2期301-310,共10页
We propose a novel high-performance hardware architecture of processor for elliptic curve scalar multiplication based on the Lopez-Dahab algorithm over GF(2^163) in polynomial basis representation. The processor can... We propose a novel high-performance hardware architecture of processor for elliptic curve scalar multiplication based on the Lopez-Dahab algorithm over GF(2^163) in polynomial basis representation. The processor can do all the operations using an efficient modular arithmetic logic unit, which includes an addition unit, a square and a carefully designed multiplication unit. In the proposed architecture, multiplication, addition, and square can be performed in parallel by the decomposition of computation. The point addition and point doubling iteration operations can be performed in six multiplications by optimization and solution of data dependency. The implementation results based on Xilinx VirtexⅡ XC2V6000 FPGA show that the proposed design can do random elliptic curve scalar multiplication GF(2^163) in 34.11 μs, occupying 2821 registers and 13 376 LUTs. 展开更多
关键词 elliptic curve cryptography (ECC) scalar multiplication Hardware implementation
原文传递
基于比特重组快速模约简的高面积效率椭圆曲线标量乘法器设计
8
作者 刘志伟 张琦 +4 位作者 黄海 杨晓秋 陈冠百 赵石磊 于斌 《电子与信息学报》 EI CAS CSCD 北大核心 2024年第1期344-352,共9页
针对现有椭圆曲线密码标量乘法器难以兼顾灵活性和面积效率的问题,该文设计了一种基于比特重组快速模约简的高面积效率标量乘法器。首先,根据椭圆曲线标量乘的运算特点,设计了一种可实现乘法和模逆两种运算的硬件复用运算单元以提高硬... 针对现有椭圆曲线密码标量乘法器难以兼顾灵活性和面积效率的问题,该文设计了一种基于比特重组快速模约简的高面积效率标量乘法器。首先,根据椭圆曲线标量乘的运算特点,设计了一种可实现乘法和模逆两种运算的硬件复用运算单元以提高硬件资源使用率,并采用Karatsuba-Ofman算法提高计算性能。其次,设计了基于比特重组的快速模约简算法,并实现了支持secp256k1, secp256r1和SCA-256(SM2标准推荐曲线)快速模约简计算的硬件架构。最后,对点加和倍点的模运算操作调度进行了优化,提高乘法与快速模约简的利用率,降低了标量乘计算所需的周期数量。所设计的标量乘法器在55 nm CMOS工艺下需要275 k个等效门,标量乘运算速度为48 309次/s,面积时间积达到5.7。 展开更多
关键词 椭圆曲线密码 硬件实现 Secp256k1 标量乘 快速模约简
下载PDF
椭圆曲线标量乘高效方案设计
9
作者 吴昆 胡现刚 +1 位作者 张学超 汪晓睿 《网络安全与数据治理》 2024年第8期28-34,共7页
对于一些资源受限的应用场景而言,椭圆曲线密码算法的计算量还是比较大,这严重影响了网络的生命周期,需要对算法进行轻量化改进以减少资源消耗。标量乘运算是影响椭圆曲线密码算法执行效率的关键,针对无线传感器节点的内存和处理特点,... 对于一些资源受限的应用场景而言,椭圆曲线密码算法的计算量还是比较大,这严重影响了网络的生命周期,需要对算法进行轻量化改进以减少资源消耗。标量乘运算是影响椭圆曲线密码算法执行效率的关键,针对无线传感器节点的内存和处理特点,首先对其底层的域运算进行改进,提出了二进制域上的3-Karatsuba联合区块乘法算法、快速模约减算法、模平方及模逆算法,减少了域运算过程的基本运算和内存读写次数,最后基于Montgomery算法设计了GF(2~m)上的标量乘快速实现方案。在8 bit AVR微处理器上实验表明,完成一次GF(2~(163))域上的ECC点乘运算共需要5 160 991个时钟周期,时间消耗大约为0.70 s,改进后的方案在运算效率方面有一定优化。 展开更多
关键词 椭圆曲线密码 标量乘 二进制域运算 模运算
下载PDF
Upper Bound of Scalars in the Integer Sub-decomposition Method: The Theoretical Aspects
10
作者 Ruma Kareem K. Ajeena 《Journal of Control Science and Engineering》 2015年第2期91-101,共11页
The focal point of this paper is to present the theoretical aspects of the building blocks of the upper bounds of ISD (integer sub-decomposition) method defined by kP = k11P + k12ψ1 (P) + k21P + k22ψ2 (P) w... The focal point of this paper is to present the theoretical aspects of the building blocks of the upper bounds of ISD (integer sub-decomposition) method defined by kP = k11P + k12ψ1 (P) + k21P + k22ψ2 (P) with max {|k11|, |k12|} 〈 Ca√n and max{|k21|, |k22|}≤C√, where C=I that uses efficiently computable endomorphisms ψj for j=1,2 to compute any multiple kP of a point P of order n lying on an elliptic curve E. The upper bounds of sub-scalars in ISD method are presented and utilized to enhance the rate of successful computation of scalar multiplication kP. Important theorems that establish the upper bounds of the kernel vectors of the ISD reduction map are generalized and proved in this work. The values of C in the upper bounds, that are greater than 1, have been proven in two cases of characteristic polynomials (with degree 1 or 2) of the endomorphisms. The upper bound of ISD method with the case of the endomorphism rings over an integer ring Z results in a higher rate of successful computations kP. Compared to the case of endomorphism rings, which is embedded over an imaginary quadratic field Q = [4-D]. The determination of the upper bounds is considered as a key point in developing the ISD elliptic scalar multiplication technique. 展开更多
关键词 elliptic curve cryptography scalar multiplication ISD method efficiently computable endomorphism upper bounds.
下载PDF
一种用于加速椭圆曲线数量乘的Signed-Binary整数表示法
11
作者 蒋苏立 陈勇 《计算机科学》 CSCD 北大核心 2006年第9期281-283,共3页
椭圆曲线公开加密系统已经得到了广泛的应用,其中最重要并且花费运行时间最多的运算就是计算数量乘。为了提高数量乘的运算度,本文提出了一种用于加速椭圆曲线数量乘的容易实现的Signed-Binary整数表示法,在不增加计算数量乘算法中预处... 椭圆曲线公开加密系统已经得到了广泛的应用,其中最重要并且花费运行时间最多的运算就是计算数量乘。为了提高数量乘的运算度,本文提出了一种用于加速椭圆曲线数量乘的容易实现的Signed-Binary整数表示法,在不增加计算数量乘算法中预处理的复杂度的前提下,减少了点倍乘的次数,有效地提高了计算椭圆曲线点数量乘的速度。 展开更多
关键词 椭圆曲线 数量乘 Signed—binary整数表示法
下载PDF
抗SPA攻击的Twisted Edwards曲线标量乘法实现
12
作者 王松 房利国 +2 位作者 韩炼冰 刘鸿博 杨敏旭 《通信技术》 2023年第2期231-235,共5页
椭圆曲线密码(Elliptic Curve Cryptography,ECC)是一种非对称密码,在信息安全领域中扮演着越来越重要的角色。目前对椭圆曲线密码的研究大多针对Weierstrass曲线,对于Twisted Edwards曲线的研究较少。针对Twisted Edwards曲线上标量乘... 椭圆曲线密码(Elliptic Curve Cryptography,ECC)是一种非对称密码,在信息安全领域中扮演着越来越重要的角色。目前对椭圆曲线密码的研究大多针对Weierstrass曲线,对于Twisted Edwards曲线的研究较少。针对Twisted Edwards曲线上标量乘法的效率及安全性,将Twisted Edwards曲线转换为Montgomery曲线,并采用Montgomery标量乘法在每次循环中都固定进行点加和倍点计算,从而能够抵抗简单能量攻击(Simple Power Analysis,SPA)。最后在复旦微电子公司型号为JFM7K325T的现场可编程门阵列(Field Programmable Gate Array,FPGA)中进行了实现和测试。结果表明,该方法能达到较理想的效果。 展开更多
关键词 椭圆曲线密码 标量乘法 Edwards曲线 Weierstrass曲线
下载PDF
椭圆曲线公钥密码体制的研究热点综述 被引量:24
13
作者 张雁 林英 郝林 《计算机工程》 CAS CSCD 北大核心 2004年第3期127-129,共3页
椭圆曲线密码体制是公钥密码中的研究热点。该文介绍了椭圆曲线密码体制的基本概念及相关知识,讨论了目前基于椭圆离散对数问题的椭圆曲线密码的研究动态,并指出今后的研究方向和重点。
关键词 椭圆曲线密码体制 椭圆曲线离散对数问题 椭圆曲线 倍乘
下载PDF
基于椭圆曲线离散对数问题的公钥密码 被引量:20
14
作者 李学俊 敬忠良 +1 位作者 戴冠中 张骏 《计算机工程与应用》 CSCD 北大核心 2002年第6期20-22,共3页
自1985年Koblitz和Miller首次提出椭圆曲线密码之后,这种公钥密码的潜力越来越被人们所认识。首先对椭圆曲线及其相关知识做了简单介绍,而后以相当篇幅从三个方面介绍当前椭圆曲线密码的研究热点,最后给出典型椭圆曲线密码。作为一篇综... 自1985年Koblitz和Miller首次提出椭圆曲线密码之后,这种公钥密码的潜力越来越被人们所认识。首先对椭圆曲线及其相关知识做了简单介绍,而后以相当篇幅从三个方面介绍当前椭圆曲线密码的研究热点,最后给出典型椭圆曲线密码。作为一篇综述,文中反映了椭圆曲线密码的发展状况以及当前所面临的问题,体现了该领域目前的最新成就。 展开更多
关键词 公钥密码 椭圆曲线离散对数问题 安全性 数点问题 标量乘法 保密通信
下载PDF
一类安全椭圆曲线的选取及其标量乘法的快速计算 被引量:6
15
作者 白国强 周涛 陈弘毅 《电子学报》 EI CAS CSCD 北大核心 2002年第11期1654-1657,共4页
安全椭圆曲线的选取和标量乘法的快速计算是有效实现椭圆曲线密码体制的两个主要问题 .本文将二者结合起来考虑给出了一类适合普通PC机实现的安全椭圆曲线 ,并详细给出了选取这类曲线的具体步骤和基于“大步 小步法”思想构造了一种新... 安全椭圆曲线的选取和标量乘法的快速计算是有效实现椭圆曲线密码体制的两个主要问题 .本文将二者结合起来考虑给出了一类适合普通PC机实现的安全椭圆曲线 ,并详细给出了选取这类曲线的具体步骤和基于“大步 小步法”思想构造了一种新的计算这类曲线上标量乘法的快速算法 .这类曲线不仅选取容易而且利用本文所提出方法计算其标量乘法时能使所需椭圆曲线运算次数大大减少 .此外 ,选用这类曲线后基域中元素不再需要专门的表示方法 ,各种运算能非常快地得到实现 。 展开更多
关键词 快速计算 椭圆曲线 密码 安全 标量乘法 Frobenius展式 信息安全
下载PDF
椭圆曲线中直接计算7P的方法及其应用 被引量:14
16
作者 赖忠喜 张占军 陶东娅 《计算机应用》 CSCD 北大核心 2013年第7期1870-1874,共5页
为了提高椭圆曲线标量乘法的效率,根据将求逆转换为乘法运算的思想,提出了在二进制域F2n上用仿射坐标直接计算7P的两种算法。两种算法分别通过引入公因子和除法多项式来计算7P,其运算量分别为2I+7S+14M和I+6S+20M,比Purohit等提出的算法... 为了提高椭圆曲线标量乘法的效率,根据将求逆转换为乘法运算的思想,提出了在二进制域F2n上用仿射坐标直接计算7P的两种算法。两种算法分别通过引入公因子和除法多项式来计算7P,其运算量分别为2I+7S+14M和I+6S+20M,比Purohit等提出的算法(PUROHIT G N,RAWAT S A,KUMAR M.Elliptic curve point multiplication using MBNR and Point halving.International Journal of Advanced Networking and Applications,2012,3(5):1329-1337)分别节省了一次和两次求逆运算。同时还给出直接计算7kP的快速算法,该算法比重复计算k次7P更有效。最后结合半点运算和扩展多基表示形式将这些新算法应用到标量乘法中。实验结果表明,在美国国家标准技术研究所(NIST)推荐的椭圆曲线上,当预存储点的个数为2和5时,新算法比Purohit算法效率提高了30%和37%,比洪银芳等所提的算法(洪银芳,桂丰,丁勇.基于半点和多基表示的标量乘法扩展算法.计算机工程,2011,37(4):163-165)效率提高了9%和13%。新算法以增加少量的预计算存储为代价,能有效降低标量乘法的运算量。 展开更多
关键词 椭圆曲线密码体制 标量乘法 半点运算 扩展多基表示 仿射坐标
下载PDF
快速椭圆曲线签名验证算法 被引量:7
17
作者 张庆胜 郭宝安 +1 位作者 徐树民 程登峰 《计算机工程与设计》 CSCD 北大核心 2008年第17期4425-4427,共3页
从签名方程出发,推导出一组椭圆曲线签名验证算法,这些算法在验证步骤中,采用±的形式,只运用了一次标题乘运算,而目前国际上公认的椭圆曲线签名算法为ECDSA算法,也还有一些相关的签名算法,这些算法在验证步骤中都采用kP±lQ的... 从签名方程出发,推导出一组椭圆曲线签名验证算法,这些算法在验证步骤中,采用±的形式,只运用了一次标题乘运算,而目前国际上公认的椭圆曲线签名算法为ECDSA算法,也还有一些相关的签名算法,这些算法在验证步骤中都采用kP±lQ的形式,需要计算两次标题乘运算。因为关键运算为标题乘运算,其它运算时间可忽略不计,所以给出算法的验证步骤的运算时间仅为ECDSA算法所需时间的一半,接着还通过实验进行了验证。 展开更多
关键词 椭圆曲线 签名算法 验证 签名方程 标题乘
下载PDF
椭圆曲线密码体制中快速标量乘方法研究 被引量:10
18
作者 徐凯平 郑洪源 +1 位作者 刘锦峰 顾晶晶 《计算机工程与应用》 CSCD 北大核心 2011年第15期112-115,共4页
椭圆曲线标量乘是椭圆密码体制中最耗时的运算,其中求逆运算的次数直接决定了标量乘法的性质。转换求逆为乘法运算能够降低求逆次数。根据这个思想,给出在素数域Fp上用仿射坐标直接计算5P的算法,比传统方法节省了两次求逆运算。同时还... 椭圆曲线标量乘是椭圆密码体制中最耗时的运算,其中求逆运算的次数直接决定了标量乘法的性质。转换求逆为乘法运算能够降低求逆次数。根据这个思想,给出在素数域Fp上用仿射坐标直接计算5P的算法,比传统方法节省了两次求逆运算。同时还给出直接计算5kP的算法,比重复计算k次5P更有效。最后结合多基链把这两个新算法应用到标量乘中。实验结果表明,该方法与以往的标量乘算法相比,效率可提高6.514,相交处I/M可降到1.1。 展开更多
关键词 椭圆曲线密码体制 标量乘法 仿射坐标 多基链 求逆
下载PDF
基于FPGA的高速椭圆曲线标量乘法结构 被引量:6
19
作者 陈婧 蒋俊洁 +2 位作者 王石 邓小铁 汪东升 《计算机研究与发展》 EI CSCD 北大核心 2008年第11期1947-1954,共8页
椭圆曲线密码系统是最近十几年来获得迅速发展的一类密码系统.为了提高椭圆曲线密码系统的处理速度,针对其中最关键的运算——椭圆曲线标量乘法设计并实现了一种基于FPGA的硬件结构,完成GF(2m)上的椭圆曲线标量乘法计算.该结构最大程度... 椭圆曲线密码系统是最近十几年来获得迅速发展的一类密码系统.为了提高椭圆曲线密码系统的处理速度,针对其中最关键的运算——椭圆曲线标量乘法设计并实现了一种基于FPGA的硬件结构,完成GF(2m)上的椭圆曲线标量乘法计算.该结构最大程度地对标量乘算法的内部模块进行了并行处理,缩短最大延迟路径,从而达到提高运算速度的目的.这一结构在FPGA上实现后,计算一次GF(2163)上的椭圆曲线标量乘法只需要36μs,这一性能是目前国际上已知的基于FPGA的标量乘法器中最好的. 展开更多
关键词 椭圆曲线 标量乘法 FPGA 多项式域 硬连线逻辑
下载PDF
基于折半运算的快速双基数标量乘算法 被引量:8
20
作者 殷新春 赵荣 +1 位作者 侯红祥 谢立 《计算机应用》 CSCD 北大核心 2009年第5期1285-1288,1292,共5页
为了提高椭圆曲线标量乘法效率,对二元域上椭圆曲线的基于双基数的标量乘法进行改进。在底层域推导出直接计算3kP的快速算法,该算法只需一次求逆;新设计的以1/2和3为基的双基数编码可结合高效的直接计算3kP和折半运算,基于该双基数编码... 为了提高椭圆曲线标量乘法效率,对二元域上椭圆曲线的基于双基数的标量乘法进行改进。在底层域推导出直接计算3kP的快速算法,该算法只需一次求逆;新设计的以1/2和3为基的双基数编码可结合高效的直接计算3kP和折半运算,基于该双基数编码的标量乘算法只涉及到点加运算、折半运算、三倍点和直接计算3kP,底层域运算复杂性得到降低,在NIST推荐的椭圆曲线上比Dimitrov算法效率提高70%以上,比Wong方法提高10%以上。 展开更多
关键词 椭圆曲线密码体制 标量乘法 双基数系统 折半算法
下载PDF
上一页 1 2 10 下一页 到第
使用帮助 返回顶部