首页 | 本学科首页   官方微博 | 高级检索  
     

椭圆曲线加密算法及实例分析
引用本文:李俊芳,崔建双.椭圆曲线加密算法及实例分析[J].网络安全技术与应用,2004(11):56-57.
作者姓名:李俊芳  崔建双
作者单位:北京科技大学管理学院,北京,100083
基金项目:教育部科学技术研究重点项目“关于企业信息安全体系的研究”资助(01021)
摘    要:椭圆曲线密码体制的研究与实现已逐渐成为公钥密码体制研究的主流,其数学基础是利用椭圆曲线上的有理点构成的Abelian加法群构造的离散对数的计算困难性。在本文中,详细阐述了椭圆曲线的加法运算规则、椭圆曲线的密码体制,并列出了一个具体的实例来实现椭圆曲线密码体制。

关 键 词:椭圆曲线密码体制  基点  

The Implementation and Instance Analysis of Elliptic Curve Cryptography
Li Junfang Cui JianshuangManagement School,University of Science and Technology Beijing,Beijing.The Implementation and Instance Analysis of Elliptic Curve Cryptography[J].Net Security Technologies and Application,2004(11):56-57.
Authors:Li Junfang Cui JianshuangManagement School  University of Science and Technology Beijing  Beijing
Affiliation:Li Junfang Cui JianshuangManagement School,University of Science and Technology Beijing,Beijing,100083
Abstract:The study and implementation of elliptic curve cryptography is now becoming a focus in public-keycryptosystems ,and its foundation relies on the difficulty to solve the discrete logarithm problem of the elliptic curveabelian group. In this paper, we tell about the add rule of elliptic curves and elliptic curves cryptography. Besides ,wegive a exact example and realize elliptic curve system.
Keywords:elliptic curves cryptography  base point  order
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号