Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Engineering Journal of Wuhan University》 2011-01
Add to Favorite Get Latest Update

An improved elliptic curve cryptographic processor over GF(p)

CHEN Chuanpeng1,QIN Zhongping2(1.School of Computer,Wuhan University,Wuhan 430072,China;2.College of Software Engineering,Huazhong University of Science and Technology,Wuhan 430074,China)  
An improved high-performance elliptic curve cryptographic(ECC) processor for general curves over GF(p) is introduced.The core part of ECC system is the point scalar multiplication algorithm composed by point addition and point doubling operations.By using affine coordinates,the point addition needs one modular division and four Montgomery multiplications;and the point doubling needs one modular division and six Montgomery multiplications.A unified modular division/Montgomery multiplication algorithm is introduced to perform both modular division and Montgomery multiplication.Therefore,in the hardware implementation of ECC processor,only one arithmetic unit is needed.This arithmetic unit uses a pipeline structure to perform modular division and Montgomery multiplication parallel.So the computational time is reduced.Furthermore,an improvement of a less critical path delay has been achieved for the systolic arithmetic unit to increase the computational speed of the ECC processor.The synthesis results show that the improved elliptic curve cryptographic processor gains high performance.
【Fund】: 国家自然科学基金资助项目(编号:60673071);; 国家863计划资助项目(编号:2006AA01Z442 2007AA01Z411)
【CateGory Index】: TN918.1
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 2 Hits
1 ZHANG Huanguo1,2 QIN Zhongping1 LIU Yi3 HAN Yongqiao3(1 School of Computer,Wuhan University,129 Luoyu Road,Wuhan 430079,China)(2 The Key Laboratory of Aerospace Information Security and Trust Computing,Ministry of Education,Wuhan University,129 Luoyu Road,Wuhan 430079,China)(3 Jetway Information Security Industry Company,628 Wuluo Road,Wuhan 430070,China);A New Type Trusted Platform Module(TPM)[J];Geomatics and Information Science of Wuhan University;2008-10
2 WANG Zhao-hui~1, CHEN Jian-hua~1, TU Hang~2, LI Li~2(1.School of Mathematics and Statistics, Wuhan University,Wuhan 430072,Hubei,China;2.School of Computer, Wuhan University,Wuhan 430072,Hubei,China);Efficient Implementation of Elliptic Curve Crypto system over Prime Fields[J];Wuhan University Journal(Natural Science Edition);2004-03
Chinese Journal Full-text Database 10 Hits
1 GENG Xiuhua1,HAN Zhen1,JIN Li2,PENG Shuanghe1(1.School of Computer and Information Technology,Beijing Jiaotong University, Beijing 100044,China;2.Department of Computer,Taiyuan Normal University,Taiyuan 030012,China);Application of Trusted Computing Platform in Trust Management[J];Journal of Beijing Jiaotong University;2009-02
2 LIU Ming-hui1,XIN Yang1,YANG Yi-xian1,LI Zhong-xian1,2(1.State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications,Beijing 100876,China;2.Beijing Research and Development Center,Tianjin National Cybernet Security Limited,Beijing 100088,China);A Card-not-Present Payment System Using Direct Anonymous Attestation Mechanism[J];Journal of Beijing University of Posts and Telecommunications;2008-04
3 HAN Feng-ying1,2,ZHU Cong-xu2,3(1.Changsha Aeronautical Vocational and Technical College,ChangshaHunan410124;2.School of Information Science and Engineering,Central South University,ChangshaHunan410083;3.Guangdong Province Key Lab of Electronic Commerce Market Application Technology,GuangzhouGuangdong510320);Overview on Digital Watermarking Technology[J];Journal of Changsha Aeronautical Vocational and Technical College;2008-02
4 DONG Xiao-ning (Computing Technology Institute of Navy,Beijing 100841,P.R.China);Application of Trusted Computing[J];Computer Security;2008-08
5 HE Xiao-yu (Chongqing Jiaotong University,School of Management,Chongqing,400074,P.R.China);Application of Chaos Theory in Cryptography[J];Computer Security;2008-09
6 HU Kang-xiu,WANG Bing-xian(Faculty of Mathematics and Informational Sciences,East China Institute of Technology,Fuzhou 344000,China);Construction of"Information Security"Curriculum Group[J];Journal of East China Institute of Technology(Social Science);2008-03
7 GU Da-wei,WANG Yu-hua,HOU Zhi-qiang(College of Information Science and Engineering,Henan University of Technology,Zhengzhou 450001,China);Network Computing Based on the Credibility of Environmental Studies[J];Computer Knowledge and Technology;2009-28
8 CAO Ting,WANG Yan-xing(College of Computer,Beijing University of Technology,Beijing 100124,China);Research on Software Architecture of Food Safety Traceability System Based on Trust Computing[J];Computer Knowledge and Technology;2010-10
9 MA Zhuo,MA Jian-feng,YANG Chao,YANG Li (School of Computer Science & Technology,Xidian University,Xi'an 710071,China);Trusted Network Connect Protocol for Wireless Environment[J];Journal of Beijing University of Technology;2010-06
10 Zuo Shuangyong (School of Mathematics and Computational Science,Guilin University of Electronic Technology,Guilin 541004,China);Development of the transitive trusted chain research[J];Journal of Guilin University of Electronic Technology;2010-04
China Proceedings of conference Full-text Database 3 Hits
1 CAI Zhenguo YU Bin CHEN Tao Institute of Electronic Technology, the PLA Information Engineering University, Zhengzhou Henan 450004;The FPGA Implementation of Elliptic Curve Cryptosystem Based on Binary Fields[A];[C];2006
2 HE Ming~(1,2) QIU Hang Ping~1 YANG Fei~1 LIU Yong~1 1 PLA Science and Technology University,Institute of Command Automation,Nanjing 210007 2 Information Science and Engineering Institute,Southeast University,Nanjing 210096;Research on Trustworthy Authentication Techniques Based on the Trustworthy Distributed System[A];[C];2008
3 Zhang Fan,Sang Yongxuan,You Lin (School of Communication Engineering,Hangzhou Dianzi University,Hangzhou,310018,China);Transitive Noninterference Model for Integrity[A];[C];2010
【Secondary Citations】
Chinese Journal Full-text Database 10 Hits
1 CHEN Huo-wang,WANG Ji,Dong Wei (School of Computer,National University of Defense Technology,Changsha,Hunan 410073,China);High Confidence Software Engineering Technologies[J];Acta Electronica Sinica;2003-S1
2 MENG Qing-shu~1,ZHANG Huan-guo~1,WANG Zhang-yi~1,QIN Zhong-ping~2,PENG Wen-ling~1 (1.School of Computer Science,State Key Lab of Software Engineering,Wuhan University,Wuhan,Hubei 430072,China; 2.School of Software,Huazhong University of Science and Technology,Wuhan,Hubei 430074,China);Designing Bent Functions Using Evolving Method[J];Acta Electronica Sinica;2004-11
3 XIAO Guo-zhen, LU Ming-xin (National Key Lab of ISN, Xidian University, Xi'an 710071);DNA Computation and DNA Cryptography[J];Chinese Journal of Engineering Mathematics;2006-01
4 Tao Renji Chen Shihua (Institute of Software, Academia Sinica);A FINITE AUTOMATON PUBLIC KEY CRYPTOSYSTEM AND DIGITAL SIGNATURES[J];Chinese Journal of Computers;1985-06
5 ZHANG Huan-Guo 1) FENG Xiu-Tao 1) QIN Zhong-Ping 2) LIU Yu-Zhen 1) 1) (State Key Laborary of Software Engineering, College of Computer, Wuhan University, Wuhan 430072) 2) (Department of Mathematics, Huazhong University of Science & Technology, Wuhan 430074 );Research on Evolutionary Cryptosystems and Evolutionary DES[J];Chinese Journal of Computers;2003-12
6 LIN Chuang PENG Xue-Hai (Department of Computer Science and Technology, Tsinghua University, Beijing 100084);Research on Trustworthy Networks[J];Chinese Journal of Computers;2005-05
7 TANG Wen, CHEN Zhong (Department of Computer Science and Technology, Peking University, Beijing 100871, China);Research of Subjective Trust Management Model Based on the Fuzzy Set Theory[J];Journal of Software;2003-08
8 FENG Deng-guo (Institute of Software of Academia Sinica,State Key Lab of Information Security,Beijing 100080, China);Status quo and trend of cryptography[J];Journal of China Institute of Communications;2002-05
9 ZHANG Huanguo~(1,2),LUO Jie~1,JIN Gang~1,ZHU Zhiqiang~1,YU Fajiang~1,YAN Fei~1(1.School of Computer,Wuhan University,Wuhan 430072,Hubei,China;2.State Key Laboratory of Software Engineering,Wuhan University,Wuhan 430072,Hubei,China);Development of Trusted Computing Research[J];Journal of Wuhan University(Natural Science Edition);2006-05
10 YUAN Lulai,ZENG Guosun,WANG Wei(Department of Computer Science and Technology,Tongji University,Shanghai 201804,China);Trust Evaluation Model Based on Dempster-Shafer Evidence Theory[J];Journal of Wuhan University(Natural Science Edition);2006-05
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved