椭圆曲线算法

  • 网络ecc;Elliptic Curves;elliptic curve cryptography
椭圆曲线算法椭圆曲线算法
  1. 第二章是椭圆曲线算法的数学原理及一些本论文要使用的相关数学理论概念,包括数学对象的符号与表示,并详细描述椭圆曲线的密码学方案。

    Chapter 2 provides certain algebraic and geometrical principles of ECC and some necessary mathematical materials used in the paper , including notation and representation of mathematical objects .

  2. 针对算法进行了改进,用椭圆曲线算法代替RSA算法同样能达到相同的安全性能,而且处理效率提高。

    I use elliptic curve algorithm instead of RSA algorithm can also achieve the safety performance , and improved the efficiency processing .

  3. 首先分析了Mambo-Usuda-Okamoto的代理签名方案的不足,通过引入MUO代理签名及椭圆曲线算法,将ECDSA应用于MUO方案。

    In respect to the shortcomings of Mambo-Usuda-Okamoto 's proxy signature , this paper proposes a new proxy signature scheme by introducing MUO proxy signature and elliptic-curve algorithm , and applying ECDSA into MUO .

  4. 椭圆曲线算法的应用减少了对移动节点性能的要求;

    The application of Elliptic Curve Cryptography ( ECC ) which is appropriate for mobile nodes with limited computational power .

  5. 仿真软件可以有效地实施椭圆曲线算法的简单能量分析攻击,而差分能量分析攻击还有待进一步改善。

    The emulator can do Simple Power Analysis attacks efficiently , but Differential Power Analysis attacks still need to be improved .

  6. 该方案利用二叉树结构计算散列总值,而签名与认证算法采用椭圆曲线算法。

    The scheme uses binary tree structure to get Hash total value . Its signing and verification process is based on elliptic curve cryptosystem .

  7. 椭圆曲线算法只需要较小长度的密钥就可以获得较高的安全性,因此非常适合用智能卡来实现椭圆曲线数字签名算法。

    Elliptic curve digital signature arithmetic can achieve high security using a shorten key , so it is very suitable to realize this arithmetic on smart card .

  8. 椭圆曲线加密算法与FPGA硬件实现

    Algorithm of elliptic curve cryptography and hardware implementation with FPGA

  9. 最后,本文还介绍了用SEA算法构造安全椭圆曲线的算法及优化。

    Ourimplementation of SEA algorithm and seIection of the secure elliptic curve over GF ( p ) are efficient .

  10. RSA和椭圆曲线密码算法的研究

    Research on RSA and Elliptic Curve Cryptographic Algorithms

  11. 椭圆曲线加密算法在PKI中的应用

    Application of PKI by ECC

  12. 本文还着重在计算负载、安全性和存储量三个方面对RSA和椭圆曲线签名算法进行了比较。

    This article also focuses on the computation load , security , and storage capacity in three areas of the RSA and Elliptic Curve Signature Algorithm are compared .

  13. 详细讨论了WAP的安全实现机制,并对将高级密码标准、椭圆曲线密码算法应用于WAP中的实现方法进行了探索。

    This paper discussed security mechanism of WAP in details , and explored the approach to applying advanced encryption standard and elliptic curve cryptography to WAP .

  14. 在对AES、ECC、椭圆曲线签名算法分析的基础上,引入了组合公钥的思想,提出了一种混合密钥系统。

    This paper introduces the concept of combined public key and put forward a mixed secret key system ( AES . ECC , EC Signature algorithm ) .

  15. 本文提出了采用双域加法器和wallacetree构造双域乘法器,从而支持了两种有限域的椭圆曲线密码算法,同时还具有面积小、功耗低的特点。

    We proposed a dual field multiplier constructed from dual field adder and Wallace Tree . By this multiplier , dual field ECC is supported with small area and less energy assumption .

  16. 该文在综述目前Fp上椭圆曲线密码算法(ECC)实现方法的基础上,分析了ECC在DSP内实现的安全性问题。

    This paper summarizes the current implementation of elliptic curve cryptosystem ( ECC ) over F p , and analyzes the security problems in the implementation of ECC on DSP .

  17. 并且本论文代理签名使用的是椭圆曲线加密算法,和之前的代理多签名算法相比,它的安全性建立在ECDLP(EllipticCurveDiscreteLogarithmProblem)的难解性。

    The proxy signature of this paper is based on the Elliptic Curve Digital Signature Algorithm ( ECDSA ) . Compared to the previous proxy signature algorithm , its security is established on the intractability of Elliptic Curve Discrete Logarithm Problem .

  18. 从理论和实践上验证了EAP-TLS认证技术和椭圆曲线密钥算法对增强无线局域网安全性的可行性和实用性。

    Theoretically and practically , the paper proved the feasibility of EAP-TLS and ECC Algorithm in improving the security of WLAN .

  19. 第三,给出了一个基于CM算法的安全椭圆曲线产生算法,利用这个算法产生的椭圆曲线的阶是两个大素数的乘积,并对其的正确性进行了理论上证明。

    Third , an efficient algorithm to generate the secure elliptic curves which bases on the CM algorithm is presented . According to this algorithm , the rank of elliptic curve constructed is the product of two large prime numbers . And its correctness is proved in theory .

  20. 本文利用椭圆曲线密码算法,设计一个新的可以抵抗口令泄露攻击的三方PAKE协议。

    We propose a novel three-party PAKE protocol based on elliptic curve cryptosystem , which can resist PCI attack . In our scheme , the computational cost and communication cost for clients are lower than kindred protocols .

  21. 椭圆曲线密码算法在零知识证明方案中的应用

    Application of Elliptic Curves Cryptosystem Methods in Zero Knowledge Proof Protocol

  22. 一种无求逆方案的椭圆曲线签名算法研究及其实现

    Research and Implementation on Algorithm of Signature Based on Elliptic Curve

  23. 改进椭圆曲线加密算法抗边际信道攻击的研究

    Research on Improved Elliptic Curve Cryptology Resistant Against Side Channel Attacks

  24. 椭圆曲线加密算法在身份认证及软件注册中的实现

    Implementation of Elliptic Curve Cryptography Algorithm in Identity Authentication and Software Register

  25. 抗侧信道攻击的椭圆曲线点乘算法设计

    Point Multiplication Algorithm Design for Preventing Side-Channel Attack in Elliptic Curve Cryptosystems

  26. 素数域上亏格为3的超椭圆曲线快速算法

    Fast Arithmetic of Genus 3 Hyperelliptic Curves over Prime Fields

  27. 椭圆曲线加密算法及实例分析

    The Implementation and Instance Analysis of Elliptic Curve Cryptography

  28. 基于一种改进椭圆曲线签名算法的门限签名方案

    A Threshold Signature Scheme Based on an Improved Elliptic Curve Digital Signature Algorithm

  29. 椭圆曲线点乘算法的软硬件协同设计研究

    Co-design of the Implementation of Elliptic Curve Point Multiplication

  30. 智能卡中椭圆曲线加密算法的应用

    Application of Elliptic Curves Cryptosystem in Smart Card