期刊文献+

适合内存空间受限制设备的多标量乘算法 被引量:1

Multiple scalar multiplication algorithm suitable for memory-constraint devices
下载PDF
导出
摘要 标量乘及多标量乘算法是实现椭圆曲线密码系统的关键,如何快速高效实现标量乘及多标量乘算法是研究的重点。该文提出一个基于fractionalMOF(mutualoppositeform)的interleaving多标量乘算法,该算法能够充分利用内存空间,因此它非常适用于内存受限的设备。 The scalar multiplication and multiple scaiar multiplication dominate the execution time of elliptic curve cryptographic scherues. Hence they are the focus ofinformation security studies. A new interleaving multiple scalar multiplication algorithm based on frac. tional mutual opposite form is presented. This algorithm can make best use of memory and is preferable for memory-constraint devices.
出处 《计算机工程与设计》 CSCD 北大核心 2006年第11期1979-1980,2027,共3页 Computer Engineering and Design
基金 安徽省教育厅自然科学研究基金项目(2006KJ079B)
关键词 椭圆曲线密码系统 多标量乘 interleaving算法 MOF FRACTIONAL MOF elliptic curve cryptography multiple scalar multiplication interleaving scheme mutual opposite form MOF scheme fractional MOF scheme
  • 相关文献

参考文献7

  • 1牛广平,马建峰.椭圆曲线标量乘的快速实现[J].计算机工程,2004,30(16):45-46. 被引量:7
  • 2Julio Lopez,Ricardo Dahab.An overview of elliptic curve cryptography[R].Brazil:Institute of Computing State University of Campinas,2000. 被引量:1
  • 3Darrel Hankerson,Julio Lopez Hernandez,Alfred Menezes.Software implementation of elliptic curve cryptography over binary fields[A].Cryptographic Hardware and Embedded Systems CHES 2000[C].Springer-Verlag,2000.1-24. 被引量:1
  • 4Bodo M? ller.Improved techniques for fast exponentiation[A].Information Security and Cryptology-ICISC 2002[C].Springer-Verlag,2003.298-312. 被引量:1
  • 5Bodo M llef.Algorithms for Multi-exponentiation[A].Selected areas in cryptography-SAC 2001[C].Springer-Verlag,2001.165-180. 被引量:1
  • 6Katja Schmidt-Samoa,Olivier Semay,Tsuyoshi Takagi.Analysis of some efficient window methods and their application to elliptic curve cryptosystems[EB/OL].2004-08-16.http://www.informatik.tu-darmstadt.de/ftp/pub/TI/TR/TI-04-03.realfinal.ps.gz. 被引量:1
  • 7Okeya K,Schmidt-Samoa K,Spahn C,et al.Signed binary representations revisited[A].Advances in Cryptology-CRYPTO 2004[C].Springer-Verlag,2004.123-139. 被引量:1

二级参考文献5

  • 1Blake I F, Seroussi G,Smart N P.Elliptic Curves in Cryptography[M].Cambridge:Cambridge University Press, 1999 被引量:1
  • 2Brown M,Hankerson D,Lopez J,et al.Software Implementation of the NIST Elliptic Curves over Prime Fields[A]. Progress in CryptologyCT-RSA 2001, LNCS 2020[C], Springer-Verlag, 2001:250-265 被引量:1
  • 3Moller B.Algorithms for Multi-exponentiation[A].Selected Areas in Cryptography, LNCS 2259[C],Springer Verlag, 2001:165-180 被引量:1
  • 4Brickell E,Gor don D, McCurley K,et al. Fast Exponentiation with Precomputati on[A].Advances in Cryptology-Eurocrypt ′92,LNCS 658[C], Springer-Verlag, 1993:200-207 被引量:1
  • 5Lim C,Lee P.More Flexible Exponentiation with Precomputation[A].Advances in Cryptology-Crypto ′94, LNCS 839[C], Springer Verlag,1994:95-107 被引量:1

共引文献6

同被引文献8

  • 1KOBLITZ N. Elliptic Curve Cryptosystems [J]. Mathematics of Computation, 1987, 48 (177) : 203 -209. 被引量:1
  • 2MILLER V. Uses of Elliptic Curves in Cryptography [ C ]//Advances in Cryptology - CRYPTO' 85. New York: Springer Verlag, 1986, LNCS218 : 417 -426. 被引量:1
  • 3BERNSTEIN D, LANGE T. Faster Addition and Doubling on Elliptic Curves[ C ]//In Advances of Cryptology-Asiacrypt' 07. New York: Springer Verlag, 2007, LNCS4833:29-50. 被引量:1
  • 4HANKERSON D, MENEZES A, VANSTONE S. Guide to Elliptic Curve Cryptography [ M ]. New York : Springer-Verlag, 2004. 被引量:1
  • 5LONGA P and MIRI A. New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields [ C ]//Public Key Cryptography-PKC' 08. New York : Springer Verlag, 2008, LNCS4939:229 - 247. 被引量:1
  • 6OKEYA K, SCHMIDT S K, SPAHN C, TAKAGI T. Signed Binary Representations Revisited [ C] ffAdvances in Cryptology- CRYPTO' 04, 2004, LNCS3152 : 123 - 139. 被引量:1
  • 7刘铎,戴一奇.计算椭圆曲线上多标量乘的快速算法[J].计算机学报,2008,31(7):1131-1137. 被引量:17
  • 8鲍皖苏,陈辉.基于双基表示的并列点乘算法[J].电子学报,2009,37(4):873-876. 被引量:3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部