期刊文献+

椭圆曲线联合稀疏表算法的一种改进

An improved joint spare form algorithm of elliptic curve
下载PDF
导出
摘要 为了提高基于椭圆曲线密码系统的各种运算效率,提出了一种椭圆曲线上联合稀疏表(JSF)算法的改进算法,并对改进算法的运算效率进行了分析。分析结果表明,与改进前相比,该改进算法平均可以减少0.37次倍点运算,从而使总的运算量达到更低,而运算效率更高。如果以现有加密强度来衡量的话,算法效率可以提高0.15%。 This paper proposes an improved Joint Spare Form(JSF) algorithm of elliptic curve. The analysis of the improved algorithm shows that it can reduce the calculation amount of multiplication, therefore the overall efficiency is improved. Compared with the original algorithm, the improved algorithm can increase the efficiency by 0.15% if evaluated with the existing e ncryption strength.
出处 《信息与电子工程》 2009年第6期613-616,共4页 information and electronic engineering
关键词 椭圆曲线 双标量乘 倍点运算 联合稀疏表算法 elliptic curve double scalar multiplications point multiply Joint Spare Form algorithm
  • 相关文献

参考文献5

  • 1Yasuyuki Sakai. Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint HammingWeight Representation of Scalars[C]//ISC 2002, LNCS2433:484-d99. 被引量:1
  • 2Solinas J A. Low-Weight Binary Representations for Pairs of Integers[EB/OL]. [2009-03-20]. http://www.cacr.math.uwaterloo. ca/techreports/2001/corr2001-41.ps. 被引量:1
  • 3刘铎,戴一奇.计算椭圆曲线上多标量乘的快速算法[J].计算机学报,2008,31(7):1131-1137. 被引量:17
  • 4李德庆..椭圆曲线密码体制的研究与实现[D].西安电子科技大学,2008:
  • 5罗涛..椭圆曲线密码研究与实现[D].湖南大学,2003:

二级参考文献11

  • 1Koblitz N. Elliptic curve cryptosystems. Mathematics of computation, 1987, 48:203-209. 被引量:1
  • 2Miller V. Uses of elliptic curve in cryptography//Proceed- ings of the CRYPTO'85, LNCS218. New York: Springer Verlag, 1986:417-426. 被引量:1
  • 3Silverman H. The Arithmetic of Elliptic Curves. GTM106. New York: Springer-Verlag, 1986. 被引量:1
  • 4Institute of Electrical and Electronics, Inc. IEEE P1363/D9 Standard specifications for public-key cryptography. New York, USA, 2001. 被引量:1
  • 5Chen T-S, Huang K-H, Chung Yu-Fang. Digital multi-signature scheme based on the elliptic curve eryptosystem. Journal of Computer Science and Technology, 19(4) : 57-insicle back cover. 被引量:1
  • 6Menexes A J, Oorschot P C, Vanstone S A. Handbook of Applied Cryptography. Boca Raton: CRC Press, c1997. 被引量:1
  • 7Lim C H, Lee P J. More flexible exponentiation with precomputation//Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology, LNCS389. New York: Springer Verlag, 1994: 95-107. 被引量:1
  • 8Clavier C, Joye M. Universal exponentiation algorithm// Proceedings of the CHES2001, LNCS2162. New York: Springer Verlag, 2001:300-308. 被引量:1
  • 9EIGamel T. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 1985, IT-31(4): 469-472. 被引量:1
  • 10Solinas J. Low-weight binary representations for pairs of integers. Centre for Applied Cryptographic Research, University of Waterloo, Ontario, Canada: Technical Report CORR 2001-41, 2001. 被引量:1

共引文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部