期刊文献+

两种快速高效公钥算法 被引量:3

Two fast and efficient public-key algorithms
在线阅读 下载PDF
导出
摘要 密码体制是计算机安全的核心技术 ,对称密码体制加、解密速度快 ,却无法进行大量的密钥管理 ;公钥密码体制解决了密钥管理问题 ,但加、解密速度慢 .基于对称密码体制和公钥密码体制的特点 ,在一个统一的数学框架下 ,构造出快速高效的公钥密码算法 ,该算法在保持公钥密码算法优点的同时 ,可显著提高效率 。 Cryptosystem is the kernel technology of computer security, symmetric\|key cryptosystems has high speed of encrpytion and decryption, but it can not achieve the vast key management, and public\|key cryptosystems solve the problem of key management, but it is low inspeed. In this paper, a unitary mathematical frame of cryptosystems is presented based on the symmetric\|key and public\|key cryptosystems, from which the two fast and efficient public\|key algorithms are constructed, which, while maintaining their previous advantages, are highly efficient.
出处 《大庆石油学院学报》 CAS 北大核心 2002年第4期59-61,共3页 Journal of Daqing Petroleum Institute
基金 科技部 973基金资助项目 (G19980 3 0 42 0 )
关键词 网络安全 公钥密码体制 对称密码体制 公钥算法 network security public\|key cryptosystems symmetric\|key cryptosystems public\|key algorithms
  • 相关文献

参考文献13

  • 1Knuth D E. The Art of Computer Programming--Seminumerical Algorithms[M]. Reading: Addision-Wesley, 1981.122~125.
  • 2ELGAMAL T. A Public Key Cryposystem and a Signature Scheme Based on Discrete Logarithms[J]. IEEE Trans Inform Theory, 1985,31(4):469~472.
  • 3Diffie W, Hellman M. New Directions in Cryptography[J]. IEEE Trans Inform Theory, 1976,22(76):644~654.
  • 4Quisguisguater I J, Couvreur C. Fast Decipherment Algorithm for RSA Public-key Cryptosystem[J]. Electronics Letters, 1982,18(21):905~907.
  • 5Rivest R,Shamir A, Adleman L. A Method for Obtaining Digital Signatures and Public Key Cryptosystems[J]. Common ACM,1978,21(2):120~126.
  • 6Buchmann J,Williams H. A Key-exchange System Based on Imaginary Quadratic Fields[J]. Cryptology J, 1988,1(2):107~118.
  • 7Chor B,Rivest R. A Knapsack-type Public Key Cryptosystem Based on Arithmetic in Finite Fields[J]. IEEE Trans Inform Theory, 1988,34(5):901~909.
  • 8Goldwasser S, Micali S. Probabilistic Encryption[J]. J Computer and System Sciences, 1984,28(2):270~299.
  • 9Kobliz N. Hyperelliptic cryptosystems[J]. J Cryptology, 1989,1(3):139~150.
  • 10Odoni R, Varadharajan V , Sanders R. Public Key Distribution in Matrix Rings[J]. Electronics Letters,1984,20(9):386~387.

同被引文献7

  • 1CHAUM D. Blind signatures for Untraceable Payments [A]. Advances in Cryptology-Crypto'83 Proceedings [ C].London: Plenum Press, 1983. 199-203.
  • 2ELGAMAL T. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms [ J]. IEEE Transactions on Inform Theory, 1985,31 (4): 469-472.
  • 3RABIN M O. Digital signatures-Foundations of Secure Communication [M]. New York:Academic Press, 1978. 155-168.
  • 4RABIN M O. Digital signatures and PublicKey Functions as Factorization [R]. MIT Laboratory for Computer Science,Technical Report, MIT/LCS/TR-212, Jan.1979.
  • 5何明星,范平志.新一代私钥加密标准AES进展与评述[J].计算机应用研究,2001,18(10):4-6. 被引量:42
  • 6JIA Dan-hua,LIU Ying,WANG Liang-yuan(Department of Management, Nanjing University of Posts & Telecommunications, Nanjing 210003, P.R. China).A Study of the Effects of the Current InternationalSettlement of Internet[J].The Journal of China Universities of Posts and Telecommunications,2003,10(4):107-114. 被引量:4
  • 7秦志光.密码算法的现状和发展研究[J].计算机应用,2004,24(2):1-4. 被引量:55

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部