Research and Optimizing of the Algorithm of Elliptic Curve Cryptography

被引:0
|
作者
Chen, Er-Yang [1 ]
Lei, Lin [1 ]
Luo, Jun-Yi [1 ]
机构
[1] Chengdu Univ, Sch Elect & Informat Engn, Chengdu 610106, Peoples R China
关键词
Elliptic curve cryptosystem; Points multiplying; Quadratic residue judging; Modular multiplicative inverse;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The rate of the numerical multiplication of the points in finite field is the foundation to apply the elliptic curve cryptosystem. The principle of Decimal-Binary is ingeniously used to optimize the points multiplying and quadratic residue (modulo p) judging as well as modular multiplicative inverse is discussed in this paper. It is shown that the performances of our algorithms are superior to the previous methods.
引用
收藏
页码:1219 / 1225
页数:7
相关论文
共 50 条
  • [1] Research on elliptic curve cryptography
    Qiu, QZ
    Xiong, QX
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOL 2, 2004, : 698 - 701
  • [2] Point choosing algorithm of elliptic curve cryptography
    Lu, Chen, 2000, Xi'an Jiaotong Univ, China (34):
  • [3] Research on Fusion Algorithm of Elliptic Curve Cryptography in Advanced Metering Infrastructure Communication
    Zhang, Xidong
    Tong, Weiming
    Jin, Xianji
    Dai, Shuidong
    2014 SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2014), VOL 1, 2014, : 395 - 398
  • [4] Research on the Underlying Method of Elliptic Curve Cryptography
    Fang, Xianjin
    Yang, Gaoming
    Wu, Yanting
    2017 4TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE), 2017, : 639 - 643
  • [5] Research on design of elliptic curve cryptography chip
    Wang Zhaoshun
    Shen Guicheng
    Zhang Ranlin
    Proceedings of 2006 International Conference on Artificial Intelligence: 50 YEARS' ACHIEVEMENTS, FUTURE DIRECTIONS AND SOCIAL IMPACTS, 2006, : 600 - 603
  • [6] Improvement and Implementation of One Elliptic Curve Cryptography Algorithm
    Kong, Qingyan
    INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT (EBM2011), VOLS 1-6, 2011, : 2438 - 2440
  • [7] Algorithm and implementation of elliptic curve public key cryptography
    Gong, Shu
    Liu, Wenjiang
    Rong, Mengtian
    Gaojishu Tongxin/High Technology Letters, 2004, 14 (03):
  • [8] The Key Exchange Research of Chaotic Encryption Chip based on Elliptic Curve Cryptography Algorithm
    Zhou, Ping
    Ding, Qun
    ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL IV, PROCEEDINGS, 2009, : 689 - 693
  • [9] Research and improvement of the performance of embedded system-based elliptic curve cryptography algorithm
    Yi, Xiao-Lin
    Yang, Feng
    Lu, Peng-Cheng
    Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (12): : 1722 - 1728
  • [10] Research Issues on Elliptic Curve Cryptography and Its applications
    Shanmugalakshmi, R.
    Prabu, M.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (06): : 19 - 22