期刊文献+

NAF点乘算法的并行计算研究 被引量:4

Research for parallel computation on NAF scalar multiplication
在线阅读 下载PDF
导出
摘要 分析了目前常用的NAF点乘算法,并提出了改进的并行NAF点乘算法,改进后的算法具有并行调度点加和点倍的特点,实验表明改进后的算法比原算法效率有明显提高。 The NAF scalar multiplication algorithms which are popular scalar multiplication algorithms are studied and the improved NAF parallel scalar multiplication algorithms are presented, which could be computed in parallel. By experiment, the new algorithms have higher efficiency than previous.
出处 《电子技术应用》 北大核心 2010年第7期160-162,共3页 Application of Electronic Technique
基金 国家高技术研究发展(863)计划资助项目(2008AA01Z103)
关键词 椭圆曲线密码算法 点乘 NAF 并行调度 ECC scalar multiplication NAF parallel computation
  • 相关文献

参考文献6

  • 1MILLER V S. Use of elliptic curves in cryptography[C].CRYPTO'85, 1986:417-426.
  • 2KOBLITZ N. Elliptic curve cryptosystems[J]. Mathematics of computation, 1987,48(4):203-209.
  • 3HANKERSON D.椭圆曲线密码学引导译[M].张焕国,译.北京:电子工业出版社,2005.
  • 4IZU T, TAKAGI T. A fast parallel EC multiplication resistant against side channel attacks[R].CACR University of Waterloo.2002.
  • 5刘双根,李萍,胡予濮.椭圆曲线密码中标量乘算法的改进方案[J].计算机工程,2006,32(17):28-29. 被引量:7
  • 6陶然,陈丽燕.椭圆曲线密码体制中点乘的快速算法[J].北京理工大学学报,2005,25(8):701-704. 被引量:1

二级参考文献17

  • 1Koblitz N, Menezes A, Vanstone S. The state of elliptic curve cryptography [J]. Designs, Codes and Cryptography, 2000,19 : 173- 193.
  • 2Elgamal T. A public key cryptosystem and a signature scheme based on the discrete alogrithm [J]. IEEE Transactions on Information Theory, 1985, 31(4):469-472.
  • 3Rivest R L, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems [J]. Communications of the ACM,1978, 21(2):120-126.
  • 4Lauter K. The advantages of elliptic curve cryptography for wireless security [J]. Wireless Communications, IEEE, 2004,11 (1) : 62 -- 67.
  • 5Katti R. Speeding up elliptic cryptosystems using a new signed binary representation for integers [Z].The Euromicro Symposium on Digital System Design,Dortmund, 2002.
  • 6Booth A D. A signed binary multiplication technique[J]. Quarterly J Mechanics and Applied Math, 1951,4: 236-240.
  • 7Arno S, Wheeler F S. Signed digit representations of minimal hamming weight [J]. IEEE Transactions on Computers, 1993, 42(8):1007-1010.
  • 8Menezes A J, Orschot P C, Vanstone S A. Handbook of applied cryptography [M ]. Boca Raton: CRC Press, 1997.
  • 9Stinson D R. Cryptography theory and practice [M].Boca Raton.-CRC Press, 2002.
  • 10Diffie W, Hellman M E. New directions in cryptography [J]. IEEE Transactions on Information Theory, 1976, 22(6): 644-654.

共引文献6

同被引文献15

引证文献4

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部