咨询与建议

限定检索结果

文献类型

  • 6 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 8 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8 篇 工学
    • 8 篇 计算机科学与技术...
    • 1 篇 网络空间安全
  • 1 篇 理学
    • 1 篇 数学

主题

  • 8 篇 scalar multiplic...
  • 3 篇 elliptic curve c...
  • 1 篇 scalar encoding
  • 1 篇 elliptic curve
  • 1 篇 component
  • 1 篇 cryptography alg...
  • 1 篇 naf encoding alg...
  • 1 篇 special addition...
  • 1 篇 point quintuplin...
  • 1 篇 recoding techniq...
  • 1 篇 lopez-dahab (ld)
  • 1 篇 non-adjacent for...
  • 1 篇 side channel att...
  • 1 篇 computation time...
  • 1 篇 point arithmetic
  • 1 篇 side-channel att...
  • 1 篇 {0, 1, 3}-naf me...
  • 1 篇 montgomery ladde...
  • 1 篇 ecc
  • 1 篇 double base chai...

机构

  • 2 篇 univ putra malay...
  • 2 篇 univ putra malay...
  • 1 篇 univ waterloo wa...
  • 1 篇 natl res council...
  • 1 篇 college of compu...
  • 1 篇 peking univ sch ...
  • 1 篇 key laboratory o...
  • 1 篇 江西师范大学
  • 1 篇 beihang univ sch...
  • 1 篇 peking univ bicm...
  • 1 篇 florida atlantic...
  • 1 篇 iut acecr esfaha...
  • 1 篇 西安电子科技大学
  • 1 篇 semnan univ elec...
  • 1 篇 cent s univ sch ...
  • 1 篇 beihang univ sch...

作者

  • 2 篇 ariffin muhammad...
  • 2 篇 abdulraheem wale...
  • 2 篇 udzir nur izura ...
  • 2 篇 hu yupu
  • 2 篇 yasin sharifah b...
  • 2 篇 liu shuanggen
  • 1 篇 hutchinson aaron
  • 1 篇 hu zhi
  • 1 篇 rezai abdalhosse...
  • 1 篇 he zhenxue
  • 1 篇 du pei
  • 1 篇 wang weike
  • 1 篇 xu bin
  • 1 篇 wang xiaocui
  • 1 篇 wang tao
  • 1 篇 karabina koray
  • 1 篇 zhang guoliang
  • 1 篇 xu maozhi
  • 1 篇 wang liping
  • 1 篇 胡予濮

语言

  • 6 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"主题词=scalar multiplication algorithm"
8 条 记 录,以下是1-10 订阅
排序:
Optimization of Elliptic Curve Cryptography Resisting Power Attack scalar multiplication algorithm in Security System on Chip  12
Optimization of Elliptic Curve Cryptography Resisting Power ...
收藏 引用
12th IEEE Int Conf Ubiquitous Intelligence & Comp/12th IEEE Int Conf Autonom & Trusted Comp/15th IEEE Int Conf Scalable Comp & Commun & Associated Workshops/IEEE Int Conf Cloud & Big Data Comp/IEEE Int Conf Internet People
作者: Wang, Xiang Wang, Liping Bai, Yuanchen He, Zhenxue Wang, Tao Xu, Bin Zhang, He Wang, Xiaocui Zhou, Cheng Wang, Weike Du, Pei Beihang Univ Sch Elect & Informat Engn Beijing 100191 Peoples R China Beihang Univ Sch Comp Sci & Engn Beijing 100191 Peoples R China
this paper investigates the scalar multiplication algorithms of Elliptic Curve Cryptography (ECC) resisting power analysis attack in security System on Chip (SoC) and analyzes their efficiency. According to the charac... 详细信息
来源: 评论
Fast and secure elliptic curve scalar multiplication algorithm based on special addition chains
收藏 引用
Journal of Southeast University(English Edition) 2008年 第1期24卷 29-32页
作者: 刘双根 胡予濮 西安电子科技大学计算机网络与信息安全教育部重点实验室 江西师范大学计算机信息工程学院 南昌330022
To resist the side chaimel attacks of elliptic curve cryptography, a new fast and secure point multiplication algorithm is proposed. The algorithm is based on a particular kind of addition chains involving only additi... 详细信息
来源: 评论
A New Left-to-Right scalar multiplication algorithm Using a New Recoding Technique
收藏 引用
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS 2014年 第3期8卷 31-38页
作者: Rezai, Abdalhossein Keshavarzi, Parviz IUT ACECR Esfahan Iran Semnan Univ Elect & Comp Engn Fac Semnan Iran
Elliptic Curve Cryptosystem (ECC) is a well-known cryptosystem for securing the communications. The most important operation in ECC is scalar multiplication. The integer representation plays an important role in the p... 详细信息
来源: 评论
Improving the Performance of {0,1,3}-NAF Recoding algorithm for Elliptic Curve scalar multiplication
收藏 引用
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS 2019年 第4期10卷 275-279页
作者: AbdulRaheem, Waleed K. Yasin, Sharifah Bte Md Udzir, Nur Izura Binti Ariffin, Muhammad Rezal bin Kamel Univ Putra Malaysia Fac Comp Sci & Informat Technol Serdang Malaysia Univ Putra Malaysia Inst Math Res Serdang Malaysia
Although scalar multiplication is highly fundamental to elliptic curve cryptography (ECC), it is the most time-consuming operation. The performance of such scalar multiplication depends on the performance of its scala... 详细信息
来源: 评论
Some techniques for faster scalar multiplication on GLS curves
收藏 引用
INFORMATION PROCESSING LETTERS 2016年 第1期116卷 41-46页
作者: Hu, Zhi Zhang, Guoliang Xu, Maozhi Cent S Univ Sch Math & Stat Changsha 410083 Hunan Peoples R China Peking Univ BICMR Beijing 100871 Peoples R China Peking Univ Sch Math Sci LMAM Beijing 100871 Peoples R China
Galbraith, Lin and Scott (EUROCRYPT 2009) [8] constructed a class of elliptic curves over F-p(2) (a.k.a GLS curves) on which the Gallant-Lambert-Vanstone (GLV) method can be employed for fast scalar multiplication. In... 详细信息
来源: 评论
A New Encoding algorithm for a Multidimensional Version of the Montgomery Ladder  12th
A New Encoding Algorithm for a Multidimensional Version of t...
收藏 引用
12th International Conference on the Theory and Application of Cryptographic Techniques in Africa (AFRICACRYPT)
作者: Hutchinson, Aaron Karabina, Koray Univ Waterloo Waterloo ON Canada Florida Atlantic Univ Boca Raton FL 33431 USA Natl Res Council Canada Ottawa ON Canada
We propose a new encoding algorithm for the simultaneous differential multidimensional scalar point multiplication algorithm d-MUL. Previous encoding algorithms are known to have major drawbacks in their efficient and... 详细信息
来源: 评论
An Efficient Method against Side-Channel Attacks on ECC
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第6期11卷 1573-1576页
作者: LIU Shuanggen HU Yupu XU Wensheng Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 Shaanxi China College of Computer Information Engineering Jiangxi Normal University Nanchang 330022 Jiangxi China
Side-channel attacks (SCA) may exploit leakage information to break cryptosystems. In this paper we present a new SCA resistant Elliptic Curve scalar multiplication algorithm. The proposed algorithm, builds a sequen... 详细信息
来源: 评论
New Quintupling Point Arithmetic 5P Formulas for Lopez-Dahab Coordinate over Binary Elliptic Curve Cryptography
收藏 引用
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS 2019年 第7期10卷 397-401页
作者: AbdulRaheem, Waleed K. Yasin, Sharifah Bte Md Udzir, Nur Izura Binti Ariffin, Muhammad Rezal Bin Kamel Univ Putra Malaysia Fac Comp Sci & Informat Technol Serdang Malaysia Univ Putra Malaysia Inst Math Res Serdang Malaysia
In Elliptic Curve Cryptography (ECC), computational levels of scalar multiplication contains three levels: scalar arithmetic, point arithmetic and field arithmetic. To achieve an efficient ECC performance, precomputed... 详细信息
来源: 评论