跳到主要內容

臺灣博碩士論文加值系統

(44.222.189.51) 您好!臺灣時間:2024/05/26 19:04
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:鍾宛霖
研究生(外文):Wan-lin Chung
論文名稱:視窗編碼演算法
論文名稱(外文):Window Recoding Algorithms
指導教授:何煒華何煒華引用關係
指導教授(外文):Wei-Hua He
學位類別:碩士
校院名稱:東吳大學
系所名稱:資訊管理學系
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2012
畢業學年度:100
語文別:英文
論文頁數:28
中文關鍵詞:由左至右邊碼演算法相互交替型式非毗鄰型式
外文關鍵詞:non-adjacent formmutual opposite formleft-to-right recoding algorithm
相關次數:
  • 被引用被引用:0
  • 點閱點閱:158
  • 評分評分:
  • 下載下載:7
  • 收藏至我的研究室書目清單書目收藏:0
In elliptic curve cryptosystems, the scalar will be first recoded in base 2 usually, and then the pre-computed points will be reused for improving operational performance. This thesis proposes modified left-to-right recoding algorithms for mutual opposite forms with generalized width-w, and specified width-2, 3, and 4, respectively. Those algorithms only require simple conversion rules to achieve the non-zero density reduction. The modified wMOF and the original wMOF have the same average non-zero density and the number of pre-computed points. The recoding time of modified wMOF with width-2, 3, and 4 respectively achieves at least 16%, 21%, 29% time reduction, supported by simulation results. Therefore, the proposed algorithms can effectively improve recoding performance. The time reduction increases with increasing the window size.
誌謝 i
Abstract ii
Contents iii
List of Figures iv
List of Tables v
1.Introduction 1
2.MOF and wMOF 3
3.Modified Left-to-Right Recoding Algorithm 6
4.Simulation and Analysis 17
5.Conclusions 20
References 21
[1] G. W. Reitwiesner, "Binary Arithmetic," Advances in Computers, Vol. 1, pp. 231-308, 1960.
[2]J. A. Solinas, "Low-Weight Binary Representations for Pairs of Integers," Technical Report CORR 2001-41, 2001.
[3]K. Okeya, K. Schmidt-Samoa, C. Spahn, and T. Takagi, "Signed Binary Representations Revisited," Advances in Cryptology – CRYPTO 2004, pp. 123-139, 2004.
[4]Internet Engineering Task Force, "Elliptic Curve Cryptography (ECC) Brainpool Standard Curves and Curve Generation," Request for Comments 5639, available at http://www.rfc-editor.org/rfc/rfc5639.txt, 2010 2010.
[5]R. L. Rivest, A. Shamir, and L. M. Adleman, "A Method for Obtaining Digital Signatures and Public Key Cryptosystems," Communications of the ACM, vol. 21, pp. 120-126, 1978.
[6]IEEE P1363 Working Group, "Standard Specifications for Public Key Cryptography," available at http://grouper.ieee.org/groups/1363/,, 2000.
[7]M. Hellman, W. Diffie, "New Directions in Cryptography," IEEE Transactions on Information Theory, vol. 22, pp. 644-654, 1976.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top