期刊文献+

标量乘法底层域快速算法研究 被引量:1

On the Fast Scarlar Multiplication at Bottom Layer
在线阅读 下载PDF
导出
摘要 从椭圆曲线加法公式出发,在Comb算法中,运用以折半运算为基础的Comb标量乘算法,减少赋值和预计算期间的运算量,使得椭圆曲线标量乘法的运算效率大幅提高. From additive formula of the elliptic curve, this paper uses the Comb algorithm based on the point halving algorithm to reduce the evaluation and the amount of computation so as to greatly raise the computation effect for the ellipse scalar multiplication.
作者 蒋辉芹
机构地区 泰州学院教务处
出处 《湖州师范学院学报》 2013年第3期36-40,共5页 Journal of Huzhou University
关键词 ECC 标量乘法 直接运算 Comb算法 折半算法 ECC scalar multiplication direct computing Comb algorithm point halving algorithm
  • 相关文献

参考文献8

二级参考文献37

  • 1D M Gordon.A Survey of Fast Exponentiation Methods[J].Journal of Algorithms,1998; (27):129~146
  • 2A C Lenstra.Computational Methods in Public Key Cryptology.http://citeseer.nj.nec.com/ lenstra01 computational.html,2001
  • 3S Gao,J Gathen,D Panario et al.Algorithms for exponentiation in finite fields.http://citeseer.nj.nec.com/285748.html,2001
  • 4S M Hong,S Y Oh,H Yoon.New Modular Multiplication Algorithms for Fast Modular Exponentiation.http://citeseer.nj.nec.com/vonzurgathen00exponentiation.html,1996
  • 5G Alia,E Martinelli.Fast Modular Exponentiation of Large Numbers with Large Exponents[J].Journal of Systems Arcgitecture,2002;(47):1079~1088
  • 6J Gathen,M Nocker.Exponentiation in Finite Fields:Theory and Practice[C].In :Proc 12th Symposium Applied Algebra,Algebraic,Algorithm and Error-Correcting Coding(AAECC- 12 ).Springer lecture notes in computer science 1255,1997:88~133
  • 7J Gathen,M Nocker.Exponentiation using Addition Chains for Finite Fields.http:// citeseer.nj.nec.com/vonzurgathen00exponentiation.html,2000
  • 8E F Brickell,D M Gordon,K S McCurley et al.Fast exponentiation with precomputation[C].In:Advances in Cryptology-Proceedings of Eurocrypt'92,Springer,New York,1993:200~207
  • 9P de Rooij.Efficient exponentiation using precomputation and vector addition chains[C].In :Advances in Cryptology-Proceedings of Eurocrypt'94,Springer,New York,1995:405~415
  • 10V Dimitrov,T Cooklev.Two algorithms for modular exponentiation using nonstandard arithmetics[J].IEICE Trans Fundam,1995 ;E78-A(1 ):82~87

共引文献44

同被引文献15

  • 1张涛,范明钰,王光卫,鲁晓军.Smartcard上椭圆曲线密码算法的能量攻击和防御[J].计算机工程,2007,33(14):125-127. 被引量:11
  • 2Kocher P,Jaffe J,Jun B.Differential power analysis[C]//Proceedings of Advances in CRYPTO99,LNCS 1666,Springer-Verlag,Berlin Heidelberg,1999:388-397.
  • 3Wu K,Li H,Yu F.Retrieving lost efficiency of scalar multiplications for resisting against side-channel attacks[J].Journal of computers,2010,5(12):1878-1884.
  • 4Goron J S.Resistance against differential power analysis for elliptic curve cryptosystems[C]//Cryptographic Hardware and Embedded Systems(CHES’04),LNCS 1717,Springer-Verlag,Berlin,1999:292-302.
  • 5Gobin L.A refined power analysis attack on elliptic curve cryptosystems[C]//Public Key Cryptography 2003,LNCS 2567,Springer-Verlag,2003.
  • 6Mamiya H,Miyaji A,Morimoto H.Efficient countermeasures against RPA,DPA,and SPA[C]//Cryptographic Hardware and Embedded Systems(CHES’04),LNCS 3156,Springer-Verlag,2004:343-356.
  • 7Dimitrov V S,Jullien G A,Miller W C.Theory and applications for a double-base number system[J].IEEE Transactions on Computers,1999,48(10):1098-1106.
  • 8李浪,李仁发,Edwin H.-M.Sha.安全SoC抗功耗攻击研究综述[J].计算机科学,2009,36(6):16-18. 被引量:15
  • 9Zhang Tao,Fan Mingyu,Zheng Xiaoyu.Secure and efficient elliptic curve cryptography resists side-channel attacks[J].Journal of Systems Engineering and Electronics,2009,20(3):660-665. 被引量:8
  • 10李起瑞,胡晓波,赵静,欧海文.针对改进的Masking方法的差分功耗攻击[J].北京电子科技学院学报,2011,19(4):35-41. 被引量:1

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部