Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Information Security and Communications Privacy》 2012-02
Add to Favorite Get Latest Update

Accelerating Elliptic Curve Point Multiplication Using Alternative Scalar

WANG Yue,QIU Wei-dong (School of Information Security and Engineering,Shanghai Jiaotong University,Shanghai 200240,China)  
In the acceleration of elliptic curve point multiplication,significant research is focused on finding equivalent and efficient representation of the scalar. Because point multiplication occurs within a finite group of order n,and based on this property,Q=kP=(n-k)(-P),where n-k and -P could be easily computed. Thus two alternative scalars k and n-k are left. By choosing the scalar that involves less computation,current methods of point multiplication could be further accelerated. The theory and practice shows that by using alternative scalar,the number of point additions in repeated double-and-add algorithm could be reduced by 5% on average.
【Fund】: 科研院所社会公益研究专项资助项目(编号:GY0905)
【CateGory Index】: TN918.1
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 2 Hits
1 Liu Zhimeng Peng Daiyuan (School of Information Science & Technology',SWJTU,Chengdu 610031);Constructing of Elliptic Curves Encryptic System[J];China Information Security;2006-04
2 CHEN Hong-quan (Dept. of Information and Communication, Dalian Naval Acadamy, Dalian Liaoning 116018, China);Analysis of Elliptic Curve Encryption Schemes[J];Information Security and Communications Privacy;2008-08
Chinese Journal Full-text Database 4 Hits
1 Li Yu-yu,Han Jian-hua(Faculty of Computer,Guangdong University of Technology,Guangzhou 510006,China);Research and Realization of Authentication Scheme Based on Fingerprint and Cryptography[J];Journal of Guangdong University of Technology;2010-01
2 Hao Lifeng(Institute for Pattern Recognition and Artificial Intelligence,Huazhong University of Science and Technology,Wuhan 430070,Hubei,China);ELLIPTIC CURVE ENCRYPTION SYSTEM IN EMBEDDED SYSTEM BASED ON OpenSSL[J];Computer Applications and Software;2011-09
3 ZHANG Xiu-ai (Computer and Communication Engineering Department,Heze University,Heze Shandong 274015,China);Study of Elliptic Curve Cryptography[J];Communications Technology;2009-05
4 WANG Hong-zhen1,2,LI Zhu-lin1,2(1.Department of Computer Science,Yan'an University,Yan'an 716000,China; 2.Software R&D Center,Yan'an University,Yan'an 716000,China);Selection of Security Elliptic Curve over Prime Fields[J];Computer Technology and Development;2012-07
【Secondary Citations】
Chinese Journal Full-text Database 4 Hits
1 Zhang Fangguo Wang Changjie Wang Yumin (Key Laboratory on ISN, Xidian University, Xi'an 710071, China);THE SELECTION OF SECURE ELLIPTIC CURVES AND THEIR BASE POINTS OVER GF(p)[J];Journal of Electronics and Information Technology;2002-03
2 WANG Zhao-hui~1, CHEN Jian-hua~1, TU Hang~2, LI Li~2(1.School of Mathematics and Statistics, Wuhan University,Wuhan 430072,Hubei,China;2.School of Computer, Wuhan University,Wuhan 430072,Hubei,China);Efficient Implementation of Elliptic Curve Crypto system over Prime Fields[J];Wuhan University Journal(Natural Science Edition);2004-03
3 ZHAO Junwei,WANG Baobao (School of Computer,Xidian Univ.,Xi'an 710071,China);Study of Plaintext Embedding in Elliptic Curve Cryptosystem[J];Microcomputer Development;2003-10
4 ZHANG Long jun 1 ZHAO Lin 2 SHEN Jun yi 1 1 (Institute of Computer Software Xian Jiaotong University Xian 710049) 2 (School of Computer Technology XiDian University Xian 710071);CONSTRUCTING ELLIPTIC CURVE CRYPTOSYSTEM OVER FINITE FIELD[J];MINI-MICRO SYSTEMS;2000-10
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved