Research and Optimizing of the Algorithm of Elliptic Curve Cryptography

被引:0
|
作者
Chen, Er-Yang [1 ]
Lei, Lin [1 ]
Luo, Jun-Yi [1 ]
机构
[1] Chengdu Univ, Sch Elect & Informat Engn, Chengdu 610106, Peoples R China
关键词
Elliptic curve cryptosystem; Points multiplying; Quadratic residue judging; Modular multiplicative inverse;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The rate of the numerical multiplication of the points in finite field is the foundation to apply the elliptic curve cryptosystem. The principle of Decimal-Binary is ingeniously used to optimize the points multiplying and quadratic residue (modulo p) judging as well as modular multiplicative inverse is discussed in this paper. It is shown that the performances of our algorithms are superior to the previous methods.
引用
收藏
页码:1219 / 1225
页数:7
相关论文
共 50 条
  • [31] Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithm
    Chang, Xiangyu
    Li, Wei
    Yan, Aimin
    Tsang, Peter Wai Ming
    Poon, Ting-Chung
    SCIENTIFIC REPORTS, 2022, 12 (01)
  • [32] CREATING AN ELLIPTIC CURVE ARITHMETIC UNIT FOR USE IN ELLIPTIC CURVE CRYPTOGRAPHY
    Fournaris, Apostolos P.
    Koufopavlou, Odysseas
    2008 IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION, PROCEEDINGS, 2008, : 1457 - 1464
  • [33] Research and Implementation of Micro-Architecture for Elliptic Curve Cryptography Processor
    Li Miao
    Yang Xiaohui
    Dai Zibin
    Chen Tao
    He Liangsheng
    2011 INTERNATIONAL CONFERENCE OF ELECTRON DEVICES AND SOLID-STATE CIRCUITS (EDSSC), 2011,
  • [34] Design of elliptic curve cryptography in GSI
    Zhu, YQ
    Lin, X
    Wang, G
    CURRENT TRENDS IN HIGH PERFORMANCE COMPUTING AND ITS APPLICATIONS, PROCEEDINGS, 2005, : 623 - 628
  • [35] Elliptic Curve Cryptography in Java']Java
    Deligiannidis, Leonidas
    2015 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2015, : 193 - 193
  • [36] Issues in Elliptic Curve Cryptography Implementation
    Paryasto, Marisa W.
    Kuspriyanto
    Sutikno, Sarwono
    Sasongko, Arif
    INTERNETWORKING INDONESIA, 2009, 1 (01): : 29 - 33
  • [37] Hyper-and-elliptic-curve cryptography
    Bernstein, Daniel J.
    Lange, Tanja
    LMS JOURNAL OF COMPUTATION AND MATHEMATICS, 2014, 17 : 181 - 202
  • [38] Elliptic Curve Lightweight Cryptography: A Survey
    Andres Lara-Nino, Carlos
    Diaz-Perez, Arturo
    Morales-Sandoval, Miguel
    IEEE ACCESS, 2018, 6 : 72514 - 72550
  • [39] A New Approach to Elliptic Curve Cryptography
    Singh, L. Dolendro
    Debbarma, Tribid
    2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 78 - 82
  • [40] PARTIAL SIGNCRYPTION ELLIPTIC CURVE CRYPTOGRAPHY
    Elkamchouchi, Hassan M.
    Elhamshary, Amira S.
    2011 3RD INTERNATIONAL CONFERENCE ON COMPUTER TECHNOLOGY AND DEVELOPMENT (ICCTD 2011), VOL 3, 2012, : 641 - 647