elliptic curve 中文意思是什麼

elliptic curve 解釋
橢圓曲線
  • elliptic : adj. 1. 橢圓(形)的。2. 省略法的;有省略處的。adv. -tically
  • curve : n 1 曲線;彎曲;彎曲物。2 曲線規 (=French curve);【機械工程】曲線板;【棒球】曲線球;【統計學...
  1. The digital signature based on elliptic curve crypt system

    基於橢圓曲線密碼體制的數字簽名
  2. Ecc : elliptic curve crypto

    橢圓曲線加密
  3. Ecc elliptic curve crypto

    橢圓曲線加密
  4. In this paper, the security of the wtls is analysed. now elliptic curve and ripemd160 cryptograph algorithm is two latest methods and do not easily attack

    橢圓曲線法和ripemd ? 160是兩種目前較新的加密演算法,且不易被破解,本文初步分析和研究了這兩種方法。
  5. This thesis mainly analyses security in the wtls and reasons for defects, study two solutions of security in the wtls which are elliptic curve and ripemd160 cryptograph algorithm

    本文主要分析了wtls的安全漏洞及其存在的原因,並在此基礎上研究了兩種解決wtls安全問題的方法? ?橢圓曲線和ripemd ? 160演算法。
  6. Then the author focus on schemes including identification, digital signature and deniable authentication, and several classical algorithms are addressed as well. in addition, we analyze the differences between standard security paradigm and random oracle paradigm. based on all above, by using elliptic curve, we establish a new identification scheme and its corresponding digital signature scheme under random paradigm

    文章詳細的分析了認證系統的三種類型,即身份認證、數字簽名和消息認證,剖析了一些經典的方案,並對標準安全模式與隨機oracle模式做出比較,並基於隨機oracle模式提出了一個新的身份認證演算法及其相應的數字簽名變形,兩個演算法均在橢圓曲線上實現。
  7. Discuss the elliptic curve cryptosystems mainly

    主要討論橢圓曲線公鑰密碼體制。
  8. A group signature scheme based on elliptic curve

    一個基於橢圓曲線的群簽名方案
  9. Digital signature based on elliptic curve

    橢圓曲線數字簽名在電子政務中的應用
  10. Then we show an algorithm design of the elliptic curve crypto based on galois field. as a main part, the design theory and concrete solution of it are presented step by step, ic chip design method for implementation of the algorithm is described in detail

    設計完成了一種基於有限域的橢圓曲線加密演算法,主要包括適合於168bit橢圓曲線加密的有限域乘法、加法、除法器的實現; 4
  11. This thesis is composed of following parts : the fundamental theory of the modern cryptology is briefly researched, in which the mathematic model of cryptology, data encrypt principle and galois field theory related with elliptic curve crypto is discussed

    論文的主要內容為: 1研究了現代密碼學相關的基本理論,介紹了密碼系統的數學模型、數據加密原理和與橢圓曲線加密密切相關的有限域理論; 2
  12. This article firstly presents some introductive materials, including public - key cryptography and the motivations and the developments of the elliptic curve cryptosystems

    本文首先介紹了橢圓曲線的研究背景、國內外研究現狀、發展動態以及橢圓曲線密碼技術的歷史與現狀。
  13. An electronic cash system with multiple banks based on proxy signature from elliptic curve was proposed

    摘要提出了一個基於橢圓曲線代理簽名的多銀行電子現金系統。
  14. Chun - chih peng and chung - huang yang, " design and implementation for integer factorization and primality testing tools with elliptic curve on windows platforms, " 2007 symposium on cryptography and information security, sasebo, japan, january 2007

    張家瀚、楊中皇,支援鏈結機制之標準化時戳實作, 2007知識社群與資訊安全研討會,文化大學, 2007年5月。
  15. A elliptic curve digital signature and authentication algorithm of independent knowledge property right is designed and implemented on computer in this theme. data integrality and user authenticity is ensured

    本課題中設計了一種擁有自主知識產權的橢圓曲線數字簽名和驗證演算法,並在微機上進行了實現,確保了數據的完整性和用戶身份真實性。
  16. Digital signature and blind signature based on elliptic curve

    基於橢圓曲線的數字簽名與盲簽名
  17. Partial blind signature based on elliptic curve cryptography ensures that the e - cash is valid only in the period issued by the bank according to the withdrawal protocol, and the historical record of the e - cash that exceeds the valid period will be removed, which greatly reduce the amount of traffic and effort of calculation and improve the efficiency

    在取款協議中採用基於橢圓曲線的部分盲簽名方案,使電子現金包含由銀行頒布的有效期,超過有效期的電子現金歷史記錄將被清除,這樣減少了通信量和計算量,提高了執行效率。
  18. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並分析了橢圓曲線密碼體制的優點及研究現狀;其次研究了橢圓曲線密碼體制的基本理論;第三,分析了橢圓曲線密碼的安全性並介紹了密鑰共享,加密,數字簽名等橢圓曲線密碼體制;第四,深入研究了特徵為2的有限域f _ 2m中的元素在多項式基和最優正規基表示下的乘法運算和乘法逆運算的快速演算法,並對hankerson等人提出的多項式基下的乘法運算的快速演算法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中元素在多項式基和最優正規基表示下的乘法和乘法逆運算的性能,還對這兩種基表示下的f _ 2m域中元素運算效率的優劣作了比較和研究,所得的結論可供在實現橢圓曲線密碼體制時參考;第五,研究了目前流行的計算橢圓曲線標量乘法的快速演算法,同時改進了固定基點梳形法,提高了整個系統的速度,並在實驗的基礎上分析研究了流行演算法的優劣;第六,實現了基於f _ 2m的橢圓曲線密碼體制的演算法庫,在我們的演算法庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線密碼體制;第七,實現了兩條安全橢圓曲線上的橢圓曲線密碼體制,包括ecdh , eces , ecdsa 。
  19. Round these two respects, how to structure security elliptic curve cryptography and the implementations of ecc is first discussed in this paper. then we have analysed especially the scalar multiplication on the elliptic curves, and present a new algorithm to quickly implement the fixed point scalar multiplication according to the idea of interleaving exponentiation algorithm and power division. this algorithm is much faster than fixed - base windowing method ; and a little faster than fixed - base comb method

    圍繞這兩個方面的問題,本文首先討論了如何構造安全的橢圓曲線密碼體制和橢圓曲線密碼體制的應用;然後重點分析了橢圓曲線上數乘運算的快速實現,並結合interleavingexponentiation演算法和冪分割的思想,提出一種計算固定點數乘的快速演算法,該演算法的計算速度明顯快于fixed - basewindowing演算法,稍快于fixed - basecomb演算法。
  20. A systematic summary of previous work has been given first. then this paper presents a novel multi - stage face detection algorithm, which makes a good use of human face pattern ' s valuable information in colour image sequences. the difficult detection task has been divided into four steps : the preprocessing, which is to gain skin colored regions with human skin color model ; the roughly detection and face region refining by elliptic curve fitting ; the fine detection with facial features " detection and location ; the face / non - face classification step based on pca and gaussian density estimation technique

    本文對彩色序列圖像中的人臉檢測和跟蹤技術進行了深入的研究,其具體內容為:對近年來的研究工作進行了系統的介紹;提出了一個由粗到細的多階段的人臉檢測演算法,該演算法充分利用了序列圖像中人臉模式的各種有用信息,將復雜的檢測工作分為了四個部分:膚色區域分割預處理,人臉粗檢及利用橢圓擬和的人臉區域提煉,應用人臉基本特徵檢測和定位的人臉細檢, pca結合高斯概率密度估計的人臉驗證。
分享友人