Research on Fast Scalable Implementation of Elliptic Curve Cryptosystem on NIST Prime Field

In this paper, the importance of information security and the difference between symmetric cryptography unsymmetric cryptography are introduced. Then the principles of Elliptic Curve Cryptography and the advantages of the prime fields in FIPS 186-2 are discussed. Based on these, the flexible archite...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Guicheng Shen, Bingwu Liu
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 4
container_issue
container_start_page 1
container_title
container_volume
creator Guicheng Shen
Bingwu Liu
description In this paper, the importance of information security and the difference between symmetric cryptography unsymmetric cryptography are introduced. Then the principles of Elliptic Curve Cryptography and the advantages of the prime fields in FIPS 186-2 are discussed. Based on these, the flexible architecture of Elliptic Curve Cryptosystem is proposed and the implementation is described. In the end, a conclusion is drawn that the prime fields have many advantages over the orther prime fields.
doi_str_mv 10.1109/wicom.2011.6040173
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6040173</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6040173</ieee_id><sourcerecordid>6040173</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-9f88cfca48fa9377a1a87aab419356b31d5ec4f73a0cd0c20cef0bdb1d3d4e443</originalsourceid><addsrcrecordid>eNo1kNFKwzAYhSMqOOdeQG_yAq35mzRJL6VsOhgqbl55MdL0D0bStTRR2ds7cV4dDofvcDiEXAPLAVh1--1t3-UFA8glEwwUPyGXIAohZFGCOiWzSul_z-QZmRQgIaukkBdkFuMHY4yDUkrrCXl7wYhmtO-039GFiYmurQmmCUiX3RCww10yyR_C3tF5CH5I3tL6c_xCWo_7IfVxHxN2v_jjcr2hz6PvkC48hvaKnDsTIs6OOiWvi_mmfshWT_fL-m6VeVBlyiqntXXWCO1MxZUyYLQyphFQ8VI2HNoSrXCKG2ZbZgtm0bGmbaDlrUAh-JTc_PV6RNwOhwFm3G-P3_Afpi5XXg</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Research on Fast Scalable Implementation of Elliptic Curve Cryptosystem on NIST Prime Field</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Guicheng Shen ; Bingwu Liu</creator><creatorcontrib>Guicheng Shen ; Bingwu Liu</creatorcontrib><description>In this paper, the importance of information security and the difference between symmetric cryptography unsymmetric cryptography are introduced. Then the principles of Elliptic Curve Cryptography and the advantages of the prime fields in FIPS 186-2 are discussed. Based on these, the flexible architecture of Elliptic Curve Cryptosystem is proposed and the implementation is described. In the end, a conclusion is drawn that the prime fields have many advantages over the orther prime fields.</description><identifier>ISSN: 2161-9646</identifier><identifier>ISBN: 9781424462506</identifier><identifier>ISBN: 1424462509</identifier><identifier>EISBN: 1424462517</identifier><identifier>EISBN: 9781424462513</identifier><identifier>EISBN: 9781424462520</identifier><identifier>EISBN: 1424462525</identifier><identifier>DOI: 10.1109/wicom.2011.6040173</identifier><language>eng</language><publisher>IEEE</publisher><subject>Digital signatures ; Elliptic curve cryptography ; Elliptic curves ; Encryption ; Helium ; NIST</subject><ispartof>2011 7th International Conference on Wireless Communications, Networking and Mobile Computing, 2011, p.1-4</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6040173$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6040173$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Guicheng Shen</creatorcontrib><creatorcontrib>Bingwu Liu</creatorcontrib><title>Research on Fast Scalable Implementation of Elliptic Curve Cryptosystem on NIST Prime Field</title><title>2011 7th International Conference on Wireless Communications, Networking and Mobile Computing</title><addtitle>wicom</addtitle><description>In this paper, the importance of information security and the difference between symmetric cryptography unsymmetric cryptography are introduced. Then the principles of Elliptic Curve Cryptography and the advantages of the prime fields in FIPS 186-2 are discussed. Based on these, the flexible architecture of Elliptic Curve Cryptosystem is proposed and the implementation is described. In the end, a conclusion is drawn that the prime fields have many advantages over the orther prime fields.</description><subject>Digital signatures</subject><subject>Elliptic curve cryptography</subject><subject>Elliptic curves</subject><subject>Encryption</subject><subject>Helium</subject><subject>NIST</subject><issn>2161-9646</issn><isbn>9781424462506</isbn><isbn>1424462509</isbn><isbn>1424462517</isbn><isbn>9781424462513</isbn><isbn>9781424462520</isbn><isbn>1424462525</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo1kNFKwzAYhSMqOOdeQG_yAq35mzRJL6VsOhgqbl55MdL0D0bStTRR2ds7cV4dDofvcDiEXAPLAVh1--1t3-UFA8glEwwUPyGXIAohZFGCOiWzSul_z-QZmRQgIaukkBdkFuMHY4yDUkrrCXl7wYhmtO-039GFiYmurQmmCUiX3RCww10yyR_C3tF5CH5I3tL6c_xCWo_7IfVxHxN2v_jjcr2hz6PvkC48hvaKnDsTIs6OOiWvi_mmfshWT_fL-m6VeVBlyiqntXXWCO1MxZUyYLQyphFQ8VI2HNoSrXCKG2ZbZgtm0bGmbaDlrUAh-JTc_PV6RNwOhwFm3G-P3_Afpi5XXg</recordid><startdate>201109</startdate><enddate>201109</enddate><creator>Guicheng Shen</creator><creator>Bingwu Liu</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201109</creationdate><title>Research on Fast Scalable Implementation of Elliptic Curve Cryptosystem on NIST Prime Field</title><author>Guicheng Shen ; Bingwu Liu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-9f88cfca48fa9377a1a87aab419356b31d5ec4f73a0cd0c20cef0bdb1d3d4e443</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Digital signatures</topic><topic>Elliptic curve cryptography</topic><topic>Elliptic curves</topic><topic>Encryption</topic><topic>Helium</topic><topic>NIST</topic><toplevel>online_resources</toplevel><creatorcontrib>Guicheng Shen</creatorcontrib><creatorcontrib>Bingwu Liu</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Guicheng Shen</au><au>Bingwu Liu</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Research on Fast Scalable Implementation of Elliptic Curve Cryptosystem on NIST Prime Field</atitle><btitle>2011 7th International Conference on Wireless Communications, Networking and Mobile Computing</btitle><stitle>wicom</stitle><date>2011-09</date><risdate>2011</risdate><spage>1</spage><epage>4</epage><pages>1-4</pages><issn>2161-9646</issn><isbn>9781424462506</isbn><isbn>1424462509</isbn><eisbn>1424462517</eisbn><eisbn>9781424462513</eisbn><eisbn>9781424462520</eisbn><eisbn>1424462525</eisbn><abstract>In this paper, the importance of information security and the difference between symmetric cryptography unsymmetric cryptography are introduced. Then the principles of Elliptic Curve Cryptography and the advantages of the prime fields in FIPS 186-2 are discussed. Based on these, the flexible architecture of Elliptic Curve Cryptosystem is proposed and the implementation is described. In the end, a conclusion is drawn that the prime fields have many advantages over the orther prime fields.</abstract><pub>IEEE</pub><doi>10.1109/wicom.2011.6040173</doi><tpages>4</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 2161-9646
ispartof 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing, 2011, p.1-4
issn 2161-9646
language eng
recordid cdi_ieee_primary_6040173
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Digital signatures
Elliptic curve cryptography
Elliptic curves
Encryption
Helium
NIST
title Research on Fast Scalable Implementation of Elliptic Curve Cryptosystem on NIST Prime Field
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-31T01%3A23%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Research%20on%20Fast%20Scalable%20Implementation%20of%20Elliptic%20Curve%20Cryptosystem%20on%20NIST%20Prime%20Field&rft.btitle=2011%207th%20International%20Conference%20on%20Wireless%20Communications,%20Networking%20and%20Mobile%20Computing&rft.au=Guicheng%20Shen&rft.date=2011-09&rft.spage=1&rft.epage=4&rft.pages=1-4&rft.issn=2161-9646&rft.isbn=9781424462506&rft.isbn_list=1424462509&rft_id=info:doi/10.1109/wicom.2011.6040173&rft_dat=%3Cieee_6IE%3E6040173%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424462517&rft.eisbn_list=9781424462513&rft.eisbn_list=9781424462520&rft.eisbn_list=1424462525&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6040173&rfr_iscdi=true