Fast Elliptic Curve Algorithm of Embedded Mobile Equipment

نویسندگان

  • Lihong Zhang
  • Shuqian Chen
  • Yanglie Fu
چکیده

Selection Algorithm and Generation Algorithm of elliptic curves have been the focus of research and hotspot of the Elliptic Curve Cryptosystem. This paper discusses a random elliptic curve realization method of Embedded Mobile Equipment, the SEA algorithm and its improved algorithm from Elliptic Curve's selection, Elliptic Curve's structure and Elliptic Curve's generation. Ensuring that the embedded system in the security situation goes through invariable situation causes the embedded system to realize a fast elliptic curve realization method, which enhances the efficiency of embedded system.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient elliptic curve cryptosystems

Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...

متن کامل

Fast Scalar Multiplication on Elliptic Curve Cryptography in Selected Intervals Suitable for Wireless Sensor Networks

In Wireless Sensor Networks (WSNs), providing a robust security mechanism with limited energy resources is very challenging because of sensor node’s limited resources (computation, bandwidth, memory). Asymmetric-key can fulfill the requirement, but if the number of nodes is large, symmetric-key cryptography is the best natural method because of its scalability. Asymmetric-key cryptography is po...

متن کامل

GSM Security II

Mobility of users, transmission of signals through open-air, the requirement of low power consumption by mobile users and smaller data storage area limitation in mobile equipment make mobile wireless networks more vulnerable to security threats like eavesdropping and unauthorized access. This paper proposes a new set of security protocols to enhance the access and data security features of GSM ...

متن کامل

Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices

The Micro Edition of the Java 2 platform (J2ME) provides an application environment specifically designed to address the demands of embedded devices like cell phones, PDAs or set-top boxes. Since the J2ME platform does not include a crypto package, developers are forced to use third-party classes or to implement all cryptographic primitives from scratch. However, most existing implementations o...

متن کامل

When Instruction Set Extensions Change Algorithm Design: A Study in Elliptic Curve Cryptography

In recent years, processor customization has matured to become a trusted way of achieving aggressive performance with limited cost/energy in embedded applications. In particular, instruction set extensions (ISEs) have been proven very effective in many cases. A large body of work exists today on creating algorithms that can select efficient ISEs given an application source code: ISE automation ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013