Research on the Implementation of Elliptic Curve Cryptosystem Based on Object-Oriented Method

被引:0
作者
Shen Guicheng [1 ]
Zheng Xuefeng [1 ]
机构
[1] Beijing Univ Sci & Technol, Sch Informat Engn, Beijing 100083, Peoples R China
来源
2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31 | 2008年
关键词
Elliptic Curve Cryptosystem; Information Security; Object-Oriented Method; Finite Element Field;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
With the fast development of cryptography research and computer technology, the cryptosystems of RSA and Diffe-Hellman are getting more and more unsafe, and Elliptic Curve Cryptosystem is becoming the trend of public cryptography in the future. This paper mainly uses object-oriented technology as tools, and divides Elliptic Curve Cryptosystem into several layers, every of which corresponds a class. The properties and methods of these classes are discussed, and some methods are implemented. In the end, the advantages are analyzed, and the cryptosystem implemented with advanced programming language is easy to transplant.
引用
收藏
页码:12572 / 12575
页数:4
相关论文
共 6 条
  • [1] PKI, elliptic curve cryptography, and digital signatures
    Caelli, WJ
    Dawson, EP
    Rea, SA
    [J]. COMPUTERS & SECURITY, 1999, 18 (01) : 47 - 66
  • [2] Hankerson D., Guide to Elliptic Curve Cryptography
  • [3] KOBLITZ N, 1987, MATH COMPUT, V48, P203, DOI 10.1090/S0025-5718-1987-0866109-5
  • [4] MILLER V, 1986, ADV CRYPTOLOGY CRYPT, P417
  • [5] Computer user verification using login string keystroke dynamics
    Robinson, JA
    Liang, VM
    Chambers, JAM
    MacKenzie, CL
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 1998, 28 (02): : 236 - 241
  • [6] Wang Y., 2002, SCI TOTAL ENVIRON, P18