Abstract
Elliptic Curve Cryptography (ECC) as a research hotspot in public key cryptography. In this paper, we proposed a novel fast η -adapt slide window Elliptic Curve Cryptography algorithm to set up the software validation process. This paper introduces a novel fast η -adapt slide window of the elliptic curve cryptosystem. The innovation of this paper is a fast algorithm for elliptic curve one of the key - elliptic curve slide window size generation algorithm, given an opportunity to generate KP. Using Fast Adaptive sliding window ECC algorithm:η -adapt slide window algorithm to shorten the point addition computing time, we built a software validation System . The experiment shows that the results are excellent.
Chapter PDF
References
Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of eliminating errors in cryptographic computations. Journal of Cryptology 14(2), 101–119 (2001)
Ciet, M., Joye, M.: Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults. Designs, Codes and Cryptography 36, 33–43 (2005)
Hess, F.: The GHS Attack Revisited. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 374–387. Springer, Heidelberg (2003)
Jao, D., Yoshida, K.: Boneh-Boyen Signatures and the Strong Diffie-Hellman Problem. In: Shacham, H., Waters, B. (eds.) Pairing 2009. LNCS, vol. 5671, pp. 1–16. Springer, Heidelberg (2009)
Galbraith, S.D., Lin, X., Scott, M.: Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 518–535. Springer, Heidelberg (2009)
Hankerson, D., Karabina, K., Menezes, A.J.: Analyzing the Galbraith-Lin-Scott point multiplication method for elliptic curves over binary fields. IEEE Transactions on Computers 58, 1411–1420 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shi, H., Ouyang, Y. (2012). A Novel Fast η -Adapt Slide Window Elliptic Curve Cryptography Algorithm. In: Lei, J., Wang, F.L., Li, M., Luo, Y. (eds) Network Computing and Information Security. NCIS 2012. Communications in Computer and Information Science, vol 345. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35211-9_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-35211-9_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35210-2
Online ISBN: 978-3-642-35211-9
eBook Packages: Computer ScienceComputer Science (R0)