首页> 外文会议>International Conference on Software, Knowledge Information Management and Applications >Performance analysis of various optimization techniques for elliptic curve cryptosystems on resource-constrained devices
【24h】

Performance analysis of various optimization techniques for elliptic curve cryptosystems on resource-constrained devices

机译:资源受限设备上椭圆曲线密码系统各种优化技术的性能分析

获取原文

摘要

There is a growing demand of efficient public key cryptosystem in the cyber space. The traditional approach to public key cryptography such as RSA poses a considerable demand of computing resources. There is need of efficient public key cryptosystems so that the confidentiality and integrity remains intact on the one hand, and on the other hand it should be computationally friendly to resource-constraint mobile devices. Elliptic Curve Cryptography is one of the approaches for that. However, it has one major operation called scalar point multiplication that is CPU intensive which needs to be optimized. Further utilizing a different coordinate system for ECC operations may also enhance the problems associated with scalar point multiplication in affine coordinate system. In this context, the optimization and selection of efficient elliptic curve cryptosystem for resource constrained devices is the main motivation of this study.
机译:在网络空间中,对有效的公共密钥密码系统的需求不断增长。 RSA等传统的公钥加密方法对计算资源提出了相当大的要求。需要有效的公共密钥密码系统,以便一方面保持机密性和完整性不变,另一方面,它对资源受限的移动设备在计算上应是友好的。椭圆曲线密码术就是其中一种方法。但是,它有一个称为标量点乘法的主要操作,它需要占用大量CPU资源,因此需要对其进行优化。进一步将不同的坐标系用于ECC操作也可能会增强与仿射坐标系中标量点乘法相关的问题。在这种情况下,资源受限设备的有效椭圆曲线密码系统的优化和选择是本研究的主要动机。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号