期刊文献+
共找到272篇文章
< 1 2 14 >
每页显示 20 50 100
Message Verification Protocol Based on Bilinear Pairings and Elliptic Curves for Enhanced Security in Vehicular Ad Hoc Networks
1
作者 Vincent Omollo Nyangaresi Arkan A.Ghaib +6 位作者 Hend Muslim Jasim Zaid Ameen Abduljabbar Junchao Ma Mustafa A.Al Sibahee Abdulla J.Y.Aldarwish Ali Hasan Ali Husam A.Neamah 《Computers, Materials & Continua》 SCIE EI 2024年第10期1029-1057,共29页
Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation sector.However,the exchange of beacons and messages ov... Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation sector.However,the exchange of beacons and messages over public channels among vehicles and roadside units renders these networks vulnerable to numerous attacks and privacy violations.To address these challenges,several privacy and security preservation protocols based on blockchain and public key cryptography have been proposed recently.However,most of these schemes are limited by a long execution time and massive communication costs,which make them inefficient for on-board units(OBUs).Additionally,some of them are still susceptible to many attacks.As such,this study presents a novel protocol based on the fusion of elliptic curve cryptography(ECC)and bilinear pairing(BP)operations.The formal security analysis is accomplished using the Burrows–Abadi–Needham(BAN)logic,demonstrating that our scheme is verifiably secure.The proposed scheme’s informal security assessment also shows that it provides salient security features,such as non-repudiation,anonymity,and unlinkability.Moreover,the scheme is shown to be resilient against attacks,such as packet replays,forgeries,message falsifications,and impersonations.From the performance perspective,this protocol yields a 37.88%reduction in communication overheads and a 44.44%improvement in the supported security features.Therefore,the proposed scheme can be deployed in VANETs to provide robust security at low overheads. 展开更多
关键词 ATTACKS BILINEAR elliptic curve cryptography(ecc) PRIVACY SECURITY vehicular ad hoc network(VANET)
下载PDF
Remote sensing image encryption algorithm based on novel hyperchaos and an elliptic curve cryptosystem
2
作者 田婧希 金松昌 +2 位作者 张晓强 杨绍武 史殿习 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期292-304,共13页
Remote sensing images carry crucial ground information,often involving the spatial distribution and spatiotemporal changes of surface elements.To safeguard this sensitive data,image encryption technology is essential.... Remote sensing images carry crucial ground information,often involving the spatial distribution and spatiotemporal changes of surface elements.To safeguard this sensitive data,image encryption technology is essential.In this paper,a novel Fibonacci sine exponential map is designed,the hyperchaotic performance of which is particularly suitable for image encryption algorithms.An encryption algorithm tailored for handling the multi-band attributes of remote sensing images is proposed.The algorithm combines a three-dimensional synchronized scrambled diffusion operation with chaos to efficiently encrypt multiple images.Moreover,the keys are processed using an elliptic curve cryptosystem,eliminating the need for an additional channel to transmit the keys,thus enhancing security.Experimental results and algorithm analysis demonstrate that the algorithm offers strong security and high efficiency,making it suitable for remote sensing image encryption tasks. 展开更多
关键词 hyperchaotic system elliptic curve cryptosystem(ecc) 3D synchronous scrambled diffusion remote sensing image unmanned aerial vehicle(UAV)
下载PDF
A Secure Hardware Implementation for Elliptic Curve Digital Signature Algorithm
3
作者 Mouna Bedoui Belgacem Bouallegue +4 位作者 Abdelmoty M.Ahmed Belgacem Hamdi Mohsen Machhout Mahmoud M.Khattab 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2177-2193,共17页
Since the end of the 1990s,cryptosystems implemented on smart cards have had to deal with two main categories of attacks:side-channel attacks and fault injection attacks.Countermeasures have been developed and validat... Since the end of the 1990s,cryptosystems implemented on smart cards have had to deal with two main categories of attacks:side-channel attacks and fault injection attacks.Countermeasures have been developed and validated against these two types of attacks,taking into account a well-defined attacker model.This work focuses on small vulnerabilities and countermeasures related to the Elliptic Curve Digital Signature Algorithm(ECDSA)algorithm.The work done in this paper focuses on protecting the ECDSA algorithm against fault-injection attacks.More precisely,we are interested in the countermeasures of scalar multiplication in the body of the elliptic curves to protect against attacks concerning only a few bits of secret may be sufficient to recover the private key.ECDSA can be implemented in different ways,in software or via dedicated hardware or a mix of both.Many different architectures are therefore possible to implement an ECDSA-based system.For this reason,this work focuses mainly on the hardware implementation of the digital signature ECDSA.In addition,the proposed ECDSA architecture with and without fault detection for the scalar multiplication have been implemented on Xilinxfield programmable gate arrays(FPGA)platform(Virtex-5).Our implementation results have been compared and discussed.Our area,frequency,area overhead and frequency degradation have been compared and it is shown that the proposed architecture of ECDSA with fault detection for the scalar multiplication allows a trade-off between the hardware overhead and the security of the ECDSA. 展开更多
关键词 elliptic curve cryptography(ecc) Montgomery ladder fault detection method fault injection attack digital signature ECDSA FPGA
下载PDF
An FPGA Implementation of GF(p) Elliptic Curve Cryptographic Coprocessor 被引量:1
4
作者 LIUYu-zhen QINZhong-ping ZHANGHuan-guo 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期31-34,共4页
A GF(p) elliptic curve cryptographic coprocessor is proposed and implemented on Field Programmable Gate Array (FPGA). The focus of the coprocessor is on the most critical, complicated and time-consuming point multipli... A GF(p) elliptic curve cryptographic coprocessor is proposed and implemented on Field Programmable Gate Array (FPGA). The focus of the coprocessor is on the most critical, complicated and time-consuming point multiplications. The technique of coordinates conversion and fast multiplication algorithm of two large integers are utilized to avoid frequent inversions and to accelerate the field multiplications used in point multiplications. The characteristic of hardware parallelism is considered in the implementation of point multiplications. The coprocessor implemented on XILINX XC2V3000 computes a point multiplication for an arbitrary point on a curve defined over GF(2192?264?1) with the frequency of 10 MHz in 4.40 ms in the average case and 5.74 ms in the worst case. At the same circumstance, the coprocessor implemented on XILINX XC2V4000 takes 2.2 ms in the average case and 2.88 ms in the worst case. 展开更多
关键词 elliptic curve cryptosystems cryptographic coprocessor cryptographY information security
下载PDF
结合ECC算法的电力监控网络智能接入协议 被引量:1
5
作者 曹小明 张华兵 +2 位作者 叶思斯 石宏宇 魏理豪 《沈阳工业大学学报》 CAS 北大核心 2024年第1期60-65,共6页
为了进一步降低电力监控网络遭受攻击的风险,基于ECC公钥加密算法,提出了具有较高安全性能的智能接入协议。通过研究电力监控网络的基本架构和安全体系,总结了电力监控终端所面临的多种攻击方式。并在此基础上,利用ECC公钥加密算法,深... 为了进一步降低电力监控网络遭受攻击的风险,基于ECC公钥加密算法,提出了具有较高安全性能的智能接入协议。通过研究电力监控网络的基本架构和安全体系,总结了电力监控终端所面临的多种攻击方式。并在此基础上,利用ECC公钥加密算法,深度改进适用于电力监控网络的智能接入协议,进而优化协议的加密耗时、解密耗时及安全强度等多项参数。仿真结果表明,与基于RSA算法的协议相比,基于ECC算法的智能接入协议具备更高的安全强度。 展开更多
关键词 电力信息网络 输电线路 实时监控 安全接入 椭圆曲线算法 身份验证 安全协议 ecc公钥算法
下载PDF
ELLIPTIC CURVE CRYPTOGRAPHY BASED AUTHENTICATED KEY AGREEMENT WITH PRE-SHARED PASSWORD 被引量:1
6
作者 SuiAifen LucasC.K.Hui +1 位作者 YangYixian K.P.Chow 《Journal of Electronics(China)》 2005年第3期268-272,共5页
Based on elliptic curve Diffie-Hellman algorithm, an Elliptic Curve Authenticated Key Agreement (ECAKA) protocol with pre-shared password is proposed. Its security relies on the Elliptic Curve Discrete Logarithm Probl... Based on elliptic curve Diffie-Hellman algorithm, an Elliptic Curve Authenticated Key Agreement (ECAKA) protocol with pre-shared password is proposed. Its security relies on the Elliptic Curve Discrete Logarithm Problem (ECDLP). It provides identity authentication, key validation and perfect forward secrecy, and it can foil man-in-the-middle attacks. 展开更多
关键词 elliptic curve cryptography (ecc) DIFFIE-HELLMAN Simple Authenticated Key Agreement (SAKA)
下载PDF
DYNAMIC ID-BASED REMOTE USER MUTUAL AUTHENTICATION SCHEME WITH SMARTCARD USING ELLIPTIC CURVE CRYPTOGRAPHY
7
作者 SK Hafizul Islam G.P.Biswas 《Journal of Electronics(China)》 2014年第5期473-488,共16页
In the literature, several dynamic ID-based remote user mutual authentication schemes are implemented using password, smartcard and Elliptic Curve Cryptography(ECC), however, none of them provides resilience against d... In the literature, several dynamic ID-based remote user mutual authentication schemes are implemented using password, smartcard and Elliptic Curve Cryptography(ECC), however, none of them provides resilience against different attacks. Therefore, there is a great need to design an efficient scheme for practical applications. In this paper, we proposed such a scheme in order to provide desired security attributes and computation efficiencies. Compared with other existing techniques, our scheme is more efficient and secured. In addition, our scheme is provably secure in the random oracle model under the hardness assumption of computational Diffie-Hellman problem. 展开更多
关键词 elliptic curve cryptography(ecc) Smartcard Mutual authentication PASSWORD Perfect forward secrecy
下载PDF
DEFENSE AGAINST COLLUSION SCHEME BASED ON ELLIPTIC CURVE CRYPTOGRAPHY FOR WIRELESS SENSOR NETWORKS
8
作者 Cheng Hongbing Huang Xiao Yang Geng 《Journal of Electronics(China)》 2009年第5期651-658,共8页
Wireless Sensor Networks (WSNs) are being deployed for a wide variety of applications and the security problems of them have received considerable attention. Considering the limitations of power, computation capabilit... Wireless Sensor Networks (WSNs) are being deployed for a wide variety of applications and the security problems of them have received considerable attention. Considering the limitations of power, computation capability and storage resources, this paper proposed an efficient defense against collusion scheme based on elliptic curve cryptography for wireless sensor networks in order to solve the problems that sensor node-key leaking and adversaries make compromised nodes as their collusions to launch new attack. In the proposed scheme, the group-key distribution strategy is employed to compute the private key of each sensor node, and the encryption and decryption algorithms are constructed based on Elliptic Curve Cryptography (ECC). The command center (node) only needs to broadcast a controlling header with three group elements, and the authorized sensor node can correctly recover the session key and use it to decrypt the broadcasting message. Analysis and proof of the proposed scheme's efficiency and security show that the proposed scheme can resist the k-collusion attack efficiently. 展开更多
关键词 Wireless Sensor Networks (WSNs) COLLUSION elliptic curve cryptography ecc Security
下载PDF
High performance elliptic curve point operations with pipelined GF(2m) field multiplier
9
作者 Turki F. Al-Somani Alaaeldin Amin 《通讯和计算机(中英文版)》 2009年第10期62-69,共8页
关键词 性能指标 椭圆曲线 流水线 乘数 吞吐量 乘法器 延迟模型 架构
下载PDF
Software Implementation of Elliptic Curve Encryption over Binary Field
10
作者 ZHANG Xianfeng QIN Zhiguang ZHOU Shijie LIU Jinde(School of Computer Science and Engineering,UESTC Chengdu 610054 China) 《Journal of Electronic Science and Technology of China》 2003年第1期54-59,共6页
The mathematical theory for elliptic curve encryption based on optimal normal basis(ONB) over F_2~m is introduced.Then an elliptic curve cryptography(ECC) based encryption scheme isanalyzed and designed.The mechanism ... The mathematical theory for elliptic curve encryption based on optimal normal basis(ONB) over F_2~m is introduced.Then an elliptic curve cryptography(ECC) based encryption scheme isanalyzed and designed.The mechanism for key exchange based on Diffie-Hellman is described in detailsfor further applications.Based on these theoretic foundations,the software based on ECC is developedand an application is provided.The software is characterized by excellent security as well as highefficiency. 展开更多
关键词 network security elliptic curve cryptography(ecc) encryption software binary field
下载PDF
基于智能卡的RSA与ECC算法的比较与实现 被引量:10
11
作者 刘淳 张凤元 张其善 《计算机工程与应用》 CSCD 北大核心 2007年第4期96-98,118,共4页
智能卡上的常用公钥算法为RSA和ECC算法。分别阐述了两者在带有加密协处理器的智能卡平台上的实现过程,包括RSA算法中模幂运算、模乘运算的实现;ECC算法中基域的选择、坐标系的选择、标量乘法和域算术运算的实现。并在Infineon的SLE66CL... 智能卡上的常用公钥算法为RSA和ECC算法。分别阐述了两者在带有加密协处理器的智能卡平台上的实现过程,包括RSA算法中模幂运算、模乘运算的实现;ECC算法中基域的选择、坐标系的选择、标量乘法和域算术运算的实现。并在Infineon的SLE66CLX系列智能卡芯片上实现了多种密钥长度的RSA和ECC算法,对两种算法的时间和空间效率进行了比较,根据比较结果指出了两者的优劣。 展开更多
关键词 智能卡 RSA ecc
下载PDF
基于ECC的无线传感器网络密钥管理协议 被引量:10
12
作者 蹇波 郭永辉 +1 位作者 罗长远 李伟 《计算机工程》 CAS CSCD 北大核心 2010年第3期142-144,共3页
针对无线传感器网络在电量、计算能力和内存容量等方面的局限性,基于椭圆曲线密码体制,提出一种适用于无线传感器网络的密钥管理协议,给出通信密钥建立、新节点加入以及节点密钥更新与回收的实现过程。从协议的安全性、抗毁性和效能方... 针对无线传感器网络在电量、计算能力和内存容量等方面的局限性,基于椭圆曲线密码体制,提出一种适用于无线传感器网络的密钥管理协议,给出通信密钥建立、新节点加入以及节点密钥更新与回收的实现过程。从协议的安全性、抗毁性和效能方面进行性能分析,实验结果表明该协议具有较强的可扩展性与抵抗攻击能力。 展开更多
关键词 无线传感器网络 密钥管理 椭圆曲线密码体制 密钥回收
下载PDF
基于ECC的前向安全数字签名的研究与改进 被引量:6
13
作者 符茂胜 任哲 侯整风 《计算机工程》 EI CAS CSCD 北大核心 2006年第14期109-110,113,共3页
基于ECC的前向安全数字签名方案,签名中使用了不变量SK_i^(n^(T-i)),尽管签名私钥是前向安全性的,但实际上签名不具有前向安全性。该文提出了关联因子的概念,利用关联因子构造了一种新的基于ECC的前向安全数字签名方案,该方案不仅具有... 基于ECC的前向安全数字签名方案,签名中使用了不变量SK_i^(n^(T-i)),尽管签名私钥是前向安全性的,但实际上签名不具有前向安全性。该文提出了关联因子的概念,利用关联因子构造了一种新的基于ECC的前向安全数字签名方案,该方案不仅具有前向安全性,还具有较强的抗伪造性,有一定的理论和实用价值。 展开更多
关键词 椭圆曲线 前向安全 数字签名 密钥进化
下载PDF
一种基于门限ECC的入侵容忍CA方案 被引量:21
14
作者 张险峰 刘锦德 《计算机应用》 CSCD 北大核心 2004年第2期5-8,共4页
门限密码学提供了建立入侵容忍应用的新方法。文中在介绍并分析了基于ECC的ElGamal数字签名方案和t out of n秘密共享方案的基础上,提出了一个基于ECC的零知识证明方法和一个基于ECC的门限数字签名方案;研究了该方法和方案在建立入侵容... 门限密码学提供了建立入侵容忍应用的新方法。文中在介绍并分析了基于ECC的ElGamal数字签名方案和t out of n秘密共享方案的基础上,提出了一个基于ECC的零知识证明方法和一个基于ECC的门限数字签名方案;研究了该方法和方案在建立入侵容忍CA中的应用。最后,对比ITTC项目中关于入侵容忍CA设计的方案,分析显示该方案在安全性、效率和可用性方面具有良好的性能。 展开更多
关键词 入侵容忍 椭圆曲线密码体制(ecc) 门限数字签名 认证中心(CA)
下载PDF
基于Grover量子中间相遇搜索算法的ECC攻击错误bit的修正 被引量:8
15
作者 贾徽徽 王潮 +1 位作者 顾健 陆臻 《信息网络安全》 2016年第6期28-34,共7页
在现有的针对ECC的侧信道攻击中,密钥出现错误bit难以避免,且无法快速修正。文章将Grover量子搜索算法和中间相遇攻击相结合,提出了一种新的搜索算法——Grover量子中间相遇搜索算法,并将其应用于针对ECC的侧信道攻击中。该算法可以在O(... 在现有的针对ECC的侧信道攻击中,密钥出现错误bit难以避免,且无法快速修正。文章将Grover量子搜索算法和中间相遇攻击相结合,提出了一种新的搜索算法——Grover量子中间相遇搜索算法,并将其应用于针对ECC的侧信道攻击中。该算法可以在O(N/M)^(1/2)步修正规模为N且存在M个错误bit的密钥,与传统搜索算法的计算复杂度O(N^(M+1))相比较,计算复杂度大幅度降低。通过对算法进行分析表明,该方法能够以成功率1修正ECC攻击中出现的错误bit。 展开更多
关键词 椭圆曲线密码 侧信道攻击 GROVER算法 量子中间相遇搜索算法
下载PDF
一个基于ECC的双向认证协议 被引量:2
16
作者 张险峰 秦志光 刘锦德 《计算机科学》 CSCD 北大核心 2002年第8期36-38,共3页
1.引言 身份认证是网络安全技术的一个重要方面,身份认证机制限制非法用户访问网络资源,能够防止假冒、篡改、否认等攻击,确保用户的身份,是其他安全机制的基础.双向身份认证是指通信双方需要互相认证鉴别各自的身份[1,2].双向认证的典... 1.引言 身份认证是网络安全技术的一个重要方面,身份认证机制限制非法用户访问网络资源,能够防止假冒、篡改、否认等攻击,确保用户的身份,是其他安全机制的基础.双向身份认证是指通信双方需要互相认证鉴别各自的身份[1,2].双向认证的典型方案是Needham-Schroeder协议.常见的认证协议还有分布认证安全服务(DASS)协议、ITU-T X.509认证协议等. 展开更多
关键词 双向认证协议 ecc 身份认证 网络安全 公钥密码体制 计算机网络
下载PDF
基于ECC的支持标签所有权转移的RFID认证协议 被引量:3
17
作者 杨兴春 许春香 李朝荣 《计算机应用》 CSCD 北大核心 2017年第8期2275-2280,共6页
针对射频识别(RFID)标签认证及其所有权转移过程的隐私泄露等安全问题,以及认证协议通常与标签所有权转移协议单独设计的现状,基于支持椭圆曲线加密(ECC)的标签,提出了一个适用于开放环境的兼具标签认证和所有权转移的协议。该协议结构... 针对射频识别(RFID)标签认证及其所有权转移过程的隐私泄露等安全问题,以及认证协议通常与标签所有权转移协议单独设计的现状,基于支持椭圆曲线加密(ECC)的标签,提出了一个适用于开放环境的兼具标签认证和所有权转移的协议。该协议结构类似于Diffie-Hellman密钥交换算法结构,协议的标签隐私保护基于椭圆曲线上的计算性Diffie-Hellman问题的难解性。经证明,该协议满足标签隐私保护要求及认证协议的其他安全需求。与近年来其他基于标签支持ECC的RFID认证协议相比,从支持标签所有权转移、标签计算开销、协议通信开销和标签隐私保护等多方面综合评估,所提出的认证协议优于对比协议。另外,针对较安全的应用场合,给出了阅读器单向认证标签的简化版协议。 展开更多
关键词 射频识别 认证协议 标签 所有权转移 椭圆曲线加密
下载PDF
GF(3^m)-ECC算法及其软件实现 被引量:2
18
作者 端木庆峰 王衍波 +1 位作者 张凯泽 雷凤宇 《计算机工程》 CAS CSCD 北大核心 2009年第14期1-3,共3页
研究GF(3m)有限域算术、GF(3m)上的椭圆曲线群算术和椭圆曲线密码协议。设计并实现椭圆曲线密码算法库,对各种GF(3m)-ECC密码算法进行仿真和性能分析,结果表明GF(3m)-ECC算法与GF(2m)和GF(p)上的ECC算法效率相当,可以应用到基于ECC的各... 研究GF(3m)有限域算术、GF(3m)上的椭圆曲线群算术和椭圆曲线密码协议。设计并实现椭圆曲线密码算法库,对各种GF(3m)-ECC密码算法进行仿真和性能分析,结果表明GF(3m)-ECC算法与GF(2m)和GF(p)上的ECC算法效率相当,可以应用到基于ECC的各种安全协议设计中。 展开更多
关键词 椭圆曲线密码体制 标量乘法 三元域
下载PDF
面向RFID应用的GF(2~m)域上ECC点乘运算的轻量化改进研究 被引量:4
19
作者 魏国珩 汪亚 张焕国 《计算机工程与科学》 CSCD 北大核心 2017年第1期81-85,共5页
针对RFID等资源受限的特殊应用,选取安全性能较高的椭圆曲线算法进行轻量化改进研究,对其核心部分点乘运算中的模乘、模逆算法进行了改进,采用整体串行、部分并行的方式对算法执行结构进行了重新设计。经在FPGA上仿真验证,对比其他方案... 针对RFID等资源受限的特殊应用,选取安全性能较高的椭圆曲线算法进行轻量化改进研究,对其核心部分点乘运算中的模乘、模逆算法进行了改进,采用整体串行、部分并行的方式对算法执行结构进行了重新设计。经在FPGA上仿真验证,对比其他方案,改进后的算法在芯片占用面积和执行速度上有明显的综合优势,适用于RFID等资源受限的应用场合。 展开更多
关键词 椭圆曲线密码 射频识别 二进制域 点乘
下载PDF
基于GF(2^n)的ECC协处理器芯片设计 被引量:3
20
作者 蒋林 章倩苓 谢晓燕 《微电子学与计算机》 CSCD 北大核心 2003年第9期50-54,共5页
文章讨论了定义在GaloisField(GF)2有限域上椭圆曲线密码体制(ECC)协处理器芯片的设计。首先在详细分析基于GF(2n)ECC算法的基础上提取了最基本和关键的运算,并提出了通过协处理器来完成关键运算步骤,主处理器完成其它运算的ECC加/解密... 文章讨论了定义在GaloisField(GF)2有限域上椭圆曲线密码体制(ECC)协处理器芯片的设计。首先在详细分析基于GF(2n)ECC算法的基础上提取了最基本和关键的运算,并提出了通过协处理器来完成关键运算步骤,主处理器完成其它运算的ECC加/解密实现方案。其次,进行了加密协处理器体系结构设计,在综合考虑面积、速度、功耗的基础上选择了全串行方案来实现GF(2n)域上的乘和加运算。然后,讨论了加密协处理器芯片的电路设计和仿真、验证问题。最后讨论了芯片的物理设计并给出了样片的测试结果。 展开更多
关键词 ecc 协处理器芯片 设计 GF(2^n) 椭圆曲线密码体制 公钥密码体制
下载PDF
上一页 1 2 14 下一页 到第
使用帮助 返回顶部