橢圓曲線加密 的英文怎麼說

中文拼音 [tuǒyuánxiànjiā]
橢圓曲線加密 英文
ecc: elliptic curve crypto
  • : Ⅰ形容詞(卵形) oval-shapedⅡ名詞[書面語] (長圓形的容器) elliptic vessel
  • : 曲名詞1 (一種韻文形式) qu a type of verse for singing which emerged in the southern song and ji...
  • : 名詞1 (用絲、棉、金屬等製成的細長的東西) thread; string; wire 2 [數學] (一個點任意移動所構成的...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • 橢圓 : [數學] oval; oval shaped; ellipse; ellipsoid橢圓規 ellipsograph; [圖] elliptic trammel; 橢圓軌道 ...
  • 曲線 : [數學] curve; bight; bought; profile; net曲線板 french curve; irregular curve; curve board; splin...
  1. Ecc : elliptic curve crypto

    橢圓曲線加密
  2. Ecc elliptic curve crypto

    橢圓曲線加密
  3. In this paper, the security of the wtls is analysed. now elliptic curve and ripemd160 cryptograph algorithm is two latest methods and do not easily attack

    法和ripemd ? 160是兩種目前較新的演算法,且不易被破解,本文初步分析和研究了這兩種方法。
  4. Also we study the ecc crypto theory in the field of public crypto system, in which the ecc encrypt principle, safety, reliability, as well as the structure of ecc based on galois field is focused on

    研究了公鑰系統中的橢圓曲線加密理論,詳細闡述了有限域上的結構及其基本運算; 3
  5. Then we show an algorithm design of the elliptic curve crypto based on galois field. as a main part, the design theory and concrete solution of it are presented step by step, ic chip design method for implementation of the algorithm is described in detail

    設計完成了一種基於有限域的橢圓曲線加密演算法,主要包括適合於168bit橢圓曲線加密的有限域乘法、法、除法器的實現; 4
  6. This thesis is composed of following parts : the fundamental theory of the modern cryptology is briefly researched, in which the mathematic model of cryptology, data encrypt principle and galois field theory related with elliptic curve crypto is discussed

    論文的主要內容為: 1研究了現代碼學相關的基本理論,介紹了碼系統的數學模型、數據原理和與橢圓曲線加密切相關的有限域理論; 2
  7. Selection of secure elliptic curves, implementation of elgamal encrytion and signature over big prime field ; 2. fpga implementation of point multiplication ; 3. at last put forward two blind signature based on ecc, nyberg - rueppel blind scheme and dsa blind scheme, these two schemes can be used in e - cash svstems

    作者所做的主要工作有: ( 1 )實現了安全的選取,實現了基於大素數域上的的elgamal和數字簽名: ( 2 )設計了標量乘的fpga功能模擬; ( 3 )最後提出兩種用碼體制實現的盲簽名方案,基於ecc的nvberg - rueppel盲簽名方案和基於ecc的dsa盲簽名方案,這兩種方案可以用於電子現金系統獲得匿名性。
  8. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並分析了碼體制的優點及研究現狀;其次研究了碼體制的基本理論;第三,分析了碼的安全性並介紹了鑰共享,,數字簽名等碼體制;第四,深入研究了特徵為2的有限域f _ 2m中的元素在多項式基和最優正規基表示下的乘法運算和乘法逆運算的快速演算法,並對hankerson等人提出的多項式基下的乘法運算的快速演算法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中元素在多項式基和最優正規基表示下的乘法和乘法逆運算的性能,還對這兩種基表示下的f _ 2m域中元素運算效率的優劣作了比較和研究,所得的結論可供在實現碼體制時參考;第五,研究了目前流行的計算標量乘法的快速演算法,同時改進了固定基點梳形法,提高了整個系統的速度,並在實驗的基礎上分析研究了流行演算法的優劣;第六,實現了基於f _ 2m的碼體制的演算法庫,在我們的演算法庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等碼體制;第七,實現了兩條安全上的碼體制,包括ecdh , eces , ecdsa 。
  9. The main task of this article contains : ( l ) compares algorithm and encryption and decryption between the widely - used public key encryption system rsa and ecc ; ( 2 ) directing against present elliptic curve attack algorithm, uses sea algorithm to perform choosing of safe elliptic curve and to achieve based on prime field elliptic curve ' s elgamal encryption and decryption and digital signature ; ( 3 ) discusses elliptic curve ' s application on smart card and proposes two identification plans based on eec

    綜上所述,本論文所作的主要工作有: ( 1 )對目前應用較廣的公鑰碼體制rsa和ecc演算法及實現進行比較。 ( 2 )針對目前已有的攻擊演算法,使用sea演算法實現了安全的選取,實現了基於大素數域上的的elgamal和數字簽名。 ( 3 )討論了在智能卡上的應用,並提出了兩種基於ecc的身份認證方案。
  10. In this paper, the author primarily introduces how elliptic curves have been applied to public key cryptography from algebra and number theory, analyzes the advantage and security of ecc. the work the author has done is : ( 1 ) study the arithmetic of ecc on the encryption / decryption, digital signature and key exchange schemes and analyze their security performance ; ( 2 ) propose a new id - based group signature with existed id - based digital signature and discuss its application in digital cash ; ( 3 ) realize the electronic auction system and key authentication system with ecc

    作者所作的主要工作有: ( 1 )研究了基於大素數域上的碼在鑰交換、數字簽名等方面的碼協議並分析了每種協議的安全性能; ( 2 )在現有基於身份的數字簽名方案的基礎上提出了基於身份的群簽名系統並討論了群簽名在數字現金中的應用; ( 3 )給出了碼在電子拍賣系統、鑰認證系統方面的實現方案。
  11. Then it introduces the main algorithms including the construction of elliptic curve, points operating, data types conversions, triple encryption, et al. in the end, the security of the cryptographic system is analyzed

    然後給出了該方案所涉及主要操作的演算法描述,其中包括的產生、點運算、數據類型轉換、基於cbc的三重演算法等。
  12. This article provides a brief description of rsa public key cryptography, an analysis and compare of all kinds of present existed modular exponentiation in rsa public key cryptography, a colligation of the fastest accelerating software algorithm - vlnw sliding window methods and hardware mapping fast montgomery modular multiplication algorithm that can improve the implementary efficiency of rsa public key cryptography for achieving the novel algorithm - mnexp algorithm

    本文簡單介紹了rsa公鑰碼體制,分析比較rsa公鑰碼中已有的模冪運算方法,將得到的最快軟體速演算法vlnw滑動窗口法和硬體映射最快的montgomery模乘演算法綜合,得到改進后的mnexp演算法能有效提高rsa公鑰碼的實現效率。碼系統被認為可以替代rsa演算法的一種公鑰碼體制。
  13. In this thesis, the basic problem of network security, some correlative protocols and cryptology are discussed at first, math theory in point is also studied. especially, a sort of new matrix method of solving quadratic equation over gf ( 2m ) is given, which is the key of selecting random point over elliptic curves. no better solution has been found in related literature in the world. compared with ieee p1363 ' s method, it is easy to implement the software and obtain high efficiency, etc. then the basic operation of elliptic curve is debated and the steps of finding secure curve and basis point over gf ( 2m ) are presented. moreover, the encryption and decryption schemes of the ecc are designed and the security problem of ecc is also considered. in the end, ecc by koblitz curves are implemented

    文章首先討論了網路安全基本問題、網路安全協議和碼學;對相關數學理論進行了研究,特別是給出了一種新的求解gf ( 2 ~ m )上二次方程的矩陣法,而它是選取上的隨機點的關鍵步驟,和ieeep1363的方法相比,它有易於軟體實現、效率高等優點,在國內外相關文獻上還未見到更好的求解方法;接著討論了的基本運算,進而給出了在gf ( 2 ~ m )上選取安全及基點的步驟;文章還設計了橢圓曲線加密系統的方案,討論了系統的安全性問題。最後文章就koblitz系統進行了軟體實現。
  14. With the fast development of internet, the problem of information security looks increasingly important. then on the basis of safe and high efficient encryption algorithm, some related network protocols are produced. compared with some other public key cryptosystems, elliptic curve cryptosystem ( ecc ) has many merits, so the special attention is paid to it by the network safety specialist in the world. ecc is widely argued because of no standard source code. in this article, the research is on the ecc theory and the implementation of it is also done

    隨著網際網路的快速發展,信息安全問題顯得日益重要。相關網路安全協議應運而生,而它們的基礎都是安全高效的演算法,橢圓曲線加密系統與其他公鑰系統相比有許多優點,受到國內外安全專家的極大關注。可是橢圓曲線加密系統( ecc )並無公開的標準源代碼,還處于「百花齊放,百家爭鳴」的局面,文章對于安全的橢圓曲線加密系統做了理論研究和實現工作。
  15. A blind digital signature scheme based on elliptic curve cryptosystem

    橢圓曲線加密系統
  16. Elliptic curve cryptography

    橢圓曲線加密
  17. Single key pair at 163 - bits elliptic curve cryptography inclusion of subscriber name and subscriber reference number

    數元橢圓曲線加密技術配製的獨一無二的配對碼匙
  18. Application of elliptic curve cryptosystem in digital signature

    橢圓曲線加密體制在數字簽名中的應用
  19. Analysis of security and efficiency on elliptic curves cryptosystems

    橢圓曲線加密系統的性能分析
  20. An encryption algorithm, on the basis of deep studying on modern cryptology theories especially the theory of elliptic curve, is presented and an integrated circuit design based on it is described in this dissertation

    本文在深入研究現代碼學理論特別是橢圓曲線加密理論和技術的基礎上,提出了一種橢圓曲線加密演算法,並且完成了該演算法的硬體設計。
分享友人