期刊文献+

椭圆曲线密码体制中点乘的快速算法 被引量:1

Fast Algorithm for Scalar Multiplication in Elliptic Curve Cryptography
在线阅读 下载PDF
导出
摘要 对已有的计算椭圆曲线密码体制中点乘的常用算法进行性能分析,在此基础上,针对非相邻形式算法(NAF)存在的不足,提出一种改进的基于NAF的窗口算法,并与其它的几种算法进行了比较.结果表明,改进算法减少了点乘运算中点加和倍乘的运算次数,运算效率比一般的二进制算法提高了25%. Some fast algorithms for scalar multiplication on elliptic curves are put forward and their characteristics analyzed. In order to get over the shortage of non-adjacent form (NAF) method, a new improved NAF window method introduced. Compared to other methods, this improved method significantly reduces the number of point-additions and the number of pointdoublings in scalar multiplication, and the efficiency of computation found to he increased by 25%.
作者 陶然 陈丽燕
出处 《北京理工大学学报》 EI CAS CSCD 北大核心 2005年第8期701-704,共4页 Transactions of Beijing Institute of Technology
基金 高校青年教师教学科研奖励基金项目
关键词 椭圆曲线密码体制 点乘 快速算法 非相邻形式(NAF) elliptic curve cryptography scalar multiplication fast algorithms non-adjacent form(NAF)
  • 相关文献

参考文献10

  • 1Menezes A J, Orschot P C, Vanstone S A. Handbook of applied cryptography [M ]. Boca Raton: CRC Press, 1997.
  • 2Stinson D R. Cryptography theory and practice [M].Boca Raton.-CRC Press, 2002.
  • 3Diffie W, Hellman M E. New directions in cryptography [J]. IEEE Transactions on Information Theory, 1976, 22(6): 644-654.
  • 4Koblitz N, Menezes A, Vanstone S. The state of elliptic curve cryptography [J]. Designs, Codes and Cryptography, 2000,19 : 173- 193.
  • 5Elgamal T. A public key cryptosystem and a signature scheme based on the discrete alogrithm [J]. IEEE Transactions on Information Theory, 1985, 31(4):469-472.
  • 6Rivest R L, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems [J]. Communications of the ACM,1978, 21(2):120-126.
  • 7Lauter K. The advantages of elliptic curve cryptography for wireless security [J]. Wireless Communications, IEEE, 2004,11 (1) : 62 -- 67.
  • 8Katti R. Speeding up elliptic cryptosystems using a new signed binary representation for integers [Z].The Euromicro Symposium on Digital System Design,Dortmund, 2002.
  • 9Booth A D. A signed binary multiplication technique[J]. Quarterly J Mechanics and Applied Math, 1951,4: 236-240.
  • 10Arno S, Wheeler F S. Signed digit representations of minimal hamming weight [J]. IEEE Transactions on Computers, 1993, 42(8):1007-1010.

同被引文献5

  • 1刘双根,李萍,胡予濮.椭圆曲线密码中标量乘算法的改进方案[J].计算机工程,2006,32(17):28-29. 被引量:7
  • 2MILLER V S. Use of elliptic curves in cryptography[C].CRYPTO'85, 1986:417-426.
  • 3KOBLITZ N. Elliptic curve cryptosystems[J]. Mathematics of computation, 1987,48(4):203-209.
  • 4HANKERSON D.椭圆曲线密码学引导译[M].张焕国,译.北京:电子工业出版社,2005.
  • 5IZU T, TAKAGI T. A fast parallel EC multiplication resistant against side channel attacks[R].CACR University of Waterloo.2002.

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部