军事学 >>> 军事学 >>> 军队指挥学 >>> 作战指挥 军事系统工程 军事通信学 军事情报学 密码学 军队指挥学其他学科
搜索结果: 1-10 共查到军队指挥学 elliptic curve cryptosystems相关记录10条 . 查询时间(0.045 秒)
In this paper an efficient high-speed architecture of Gaussian normal basis multiplier over binary finite field GF(2m) is presented. The structure is constructed by using regular modules for computat...
We present an innovative technique to add elliptic curve points with the form P ± Q , and discuss its application to the generation of precomputed tables for the scalar multiplication. Our analysis ...
In this paper, we present algorithms for implementation of the GHS attack to Elliptic curve cryptosystems (ECC). In particular, we consider two large classes of elliptic curves over cubic extension ...
Elliptic curve cryptography (ECC), independently introduced by Koblitz and Miller in the 80’s, has attracted increasing attention in recent years due to its shorter key length requirement in compari...
In this paper we present a new method for scalar multiplication that uses a generic multibase representation to reduce the number of required operations. Further, a multibase NAF-like algorithm that...
We present a new methodology to derive faster composite operations of the form dP+Q, where d is a small integer ≥ 2, for generic ECC scalar multiplications over prime fields. In particular, we prese...
In recent years, some attacks on cryptographic systems have been deviced, exploiting the leakage of information through so-called "side channels". When a real-life device is performing a coding or d...
Elliptic curve cryptosystems in the presence of faults were studied by Biehl, Meyer and M¨uller (2000). The first fault model they consider requires that the input point P in the computation of dP i...
This paper shows that many of elliptic curve cryptosystems over quartic extension fields of odd characteristics are reduced to genus two hyperelliptic curve cryptosystems over quadratic extension fi...
We present a new type of fault attacks on elliptic curve scalar multiplications: Sign Change Attacks. These attacks exploit di erent number representations as they are often employed in modern crypt...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...