Research on Fast Scalable Implementation of Elliptic Curve Cryptosystem on NIST Prime Field
In this paper, the importance of information security and the difference between symmetric cryptography unsymmetric cryptography are introduced. Then the principles of Elliptic Curve Cryptography and the advantages of the prime fields in FIPS 186-2 are discussed. Based on these, the flexible archite...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 4 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Guicheng Shen Bingwu Liu |
description | In this paper, the importance of information security and the difference between symmetric cryptography unsymmetric cryptography are introduced. Then the principles of Elliptic Curve Cryptography and the advantages of the prime fields in FIPS 186-2 are discussed. Based on these, the flexible architecture of Elliptic Curve Cryptosystem is proposed and the implementation is described. In the end, a conclusion is drawn that the prime fields have many advantages over the orther prime fields. |
doi_str_mv | 10.1109/wicom.2011.6040173 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6040173</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6040173</ieee_id><sourcerecordid>6040173</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-9f88cfca48fa9377a1a87aab419356b31d5ec4f73a0cd0c20cef0bdb1d3d4e443</originalsourceid><addsrcrecordid>eNo1kNFKwzAYhSMqOOdeQG_yAq35mzRJL6VsOhgqbl55MdL0D0bStTRR2ds7cV4dDofvcDiEXAPLAVh1--1t3-UFA8glEwwUPyGXIAohZFGCOiWzSul_z-QZmRQgIaukkBdkFuMHY4yDUkrrCXl7wYhmtO-039GFiYmurQmmCUiX3RCww10yyR_C3tF5CH5I3tL6c_xCWo_7IfVxHxN2v_jjcr2hz6PvkC48hvaKnDsTIs6OOiWvi_mmfshWT_fL-m6VeVBlyiqntXXWCO1MxZUyYLQyphFQ8VI2HNoSrXCKG2ZbZgtm0bGmbaDlrUAh-JTc_PV6RNwOhwFm3G-P3_Afpi5XXg</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Research on Fast Scalable Implementation of Elliptic Curve Cryptosystem on NIST Prime Field</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Guicheng Shen ; Bingwu Liu</creator><creatorcontrib>Guicheng Shen ; Bingwu Liu</creatorcontrib><description>In this paper, the importance of information security and the difference between symmetric cryptography unsymmetric cryptography are introduced. Then the principles of Elliptic Curve Cryptography and the advantages of the prime fields in FIPS 186-2 are discussed. Based on these, the flexible architecture of Elliptic Curve Cryptosystem is proposed and the implementation is described. In the end, a conclusion is drawn that the prime fields have many advantages over the orther prime fields.</description><identifier>ISSN: 2161-9646</identifier><identifier>ISBN: 9781424462506</identifier><identifier>ISBN: 1424462509</identifier><identifier>EISBN: 1424462517</identifier><identifier>EISBN: 9781424462513</identifier><identifier>EISBN: 9781424462520</identifier><identifier>EISBN: 1424462525</identifier><identifier>DOI: 10.1109/wicom.2011.6040173</identifier><language>eng</language><publisher>IEEE</publisher><subject>Digital signatures ; Elliptic curve cryptography ; Elliptic curves ; Encryption ; Helium ; NIST</subject><ispartof>2011 7th International Conference on Wireless Communications, Networking and Mobile Computing, 2011, p.1-4</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6040173$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6040173$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Guicheng Shen</creatorcontrib><creatorcontrib>Bingwu Liu</creatorcontrib><title>Research on Fast Scalable Implementation of Elliptic Curve Cryptosystem on NIST Prime Field</title><title>2011 7th International Conference on Wireless Communications, Networking and Mobile Computing</title><addtitle>wicom</addtitle><description>In this paper, the importance of information security and the difference between symmetric cryptography unsymmetric cryptography are introduced. Then the principles of Elliptic Curve Cryptography and the advantages of the prime fields in FIPS 186-2 are discussed. Based on these, the flexible architecture of Elliptic Curve Cryptosystem is proposed and the implementation is described. In the end, a conclusion is drawn that the prime fields have many advantages over the orther prime fields.</description><subject>Digital signatures</subject><subject>Elliptic curve cryptography</subject><subject>Elliptic curves</subject><subject>Encryption</subject><subject>Helium</subject><subject>NIST</subject><issn>2161-9646</issn><isbn>9781424462506</isbn><isbn>1424462509</isbn><isbn>1424462517</isbn><isbn>9781424462513</isbn><isbn>9781424462520</isbn><isbn>1424462525</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo1kNFKwzAYhSMqOOdeQG_yAq35mzRJL6VsOhgqbl55MdL0D0bStTRR2ds7cV4dDofvcDiEXAPLAVh1--1t3-UFA8glEwwUPyGXIAohZFGCOiWzSul_z-QZmRQgIaukkBdkFuMHY4yDUkrrCXl7wYhmtO-039GFiYmurQmmCUiX3RCww10yyR_C3tF5CH5I3tL6c_xCWo_7IfVxHxN2v_jjcr2hz6PvkC48hvaKnDsTIs6OOiWvi_mmfshWT_fL-m6VeVBlyiqntXXWCO1MxZUyYLQyphFQ8VI2HNoSrXCKG2ZbZgtm0bGmbaDlrUAh-JTc_PV6RNwOhwFm3G-P3_Afpi5XXg</recordid><startdate>201109</startdate><enddate>201109</enddate><creator>Guicheng Shen</creator><creator>Bingwu Liu</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201109</creationdate><title>Research on Fast Scalable Implementation of Elliptic Curve Cryptosystem on NIST Prime Field</title><author>Guicheng Shen ; Bingwu Liu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-9f88cfca48fa9377a1a87aab419356b31d5ec4f73a0cd0c20cef0bdb1d3d4e443</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Digital signatures</topic><topic>Elliptic curve cryptography</topic><topic>Elliptic curves</topic><topic>Encryption</topic><topic>Helium</topic><topic>NIST</topic><toplevel>online_resources</toplevel><creatorcontrib>Guicheng Shen</creatorcontrib><creatorcontrib>Bingwu Liu</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Guicheng Shen</au><au>Bingwu Liu</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Research on Fast Scalable Implementation of Elliptic Curve Cryptosystem on NIST Prime Field</atitle><btitle>2011 7th International Conference on Wireless Communications, Networking and Mobile Computing</btitle><stitle>wicom</stitle><date>2011-09</date><risdate>2011</risdate><spage>1</spage><epage>4</epage><pages>1-4</pages><issn>2161-9646</issn><isbn>9781424462506</isbn><isbn>1424462509</isbn><eisbn>1424462517</eisbn><eisbn>9781424462513</eisbn><eisbn>9781424462520</eisbn><eisbn>1424462525</eisbn><abstract>In this paper, the importance of information security and the difference between symmetric cryptography unsymmetric cryptography are introduced. Then the principles of Elliptic Curve Cryptography and the advantages of the prime fields in FIPS 186-2 are discussed. Based on these, the flexible architecture of Elliptic Curve Cryptosystem is proposed and the implementation is described. In the end, a conclusion is drawn that the prime fields have many advantages over the orther prime fields.</abstract><pub>IEEE</pub><doi>10.1109/wicom.2011.6040173</doi><tpages>4</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 2161-9646 |
ispartof | 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing, 2011, p.1-4 |
issn | 2161-9646 |
language | eng |
recordid | cdi_ieee_primary_6040173 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Digital signatures Elliptic curve cryptography Elliptic curves Encryption Helium NIST |
title | Research on Fast Scalable Implementation of Elliptic Curve Cryptosystem on NIST Prime Field |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-31T01%3A23%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Research%20on%20Fast%20Scalable%20Implementation%20of%20Elliptic%20Curve%20Cryptosystem%20on%20NIST%20Prime%20Field&rft.btitle=2011%207th%20International%20Conference%20on%20Wireless%20Communications,%20Networking%20and%20Mobile%20Computing&rft.au=Guicheng%20Shen&rft.date=2011-09&rft.spage=1&rft.epage=4&rft.pages=1-4&rft.issn=2161-9646&rft.isbn=9781424462506&rft.isbn_list=1424462509&rft_id=info:doi/10.1109/wicom.2011.6040173&rft_dat=%3Cieee_6IE%3E6040173%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424462517&rft.eisbn_list=9781424462513&rft.eisbn_list=9781424462520&rft.eisbn_list=1424462525&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6040173&rfr_iscdi=true |