CHEN Dao-bo and JIANG Yu-ming. Analysis of inverse algorithm and representation on binary finite fields[J]. Journal of Light Industry, 2012, 27(2): 84-86. doi: 10.3969/j.issn.1004-1478.2012.02.021
Citation:
CHEN Dao-bo and JIANG Yu-ming. Analysis of inverse algorithm and representation on binary finite fields[J]. Journal of Light Industry, 2012, 27(2): 84-86.
doi:
10.3969/j.issn.1004-1478.2012.02.021
Analysis of inverse algorithm and representation on binary finite fields
-
Received Date:
2011-09-27
Available Online:
2012-03-15
-
Abstract
The features of binary finite field's structure was analyzed and the inverse algorithm under binary model was summarized.The problem of finite field algorithm module not general was solved.
-
-
References
-
[1]
Mullin R C,Onyszchuk I,Vanstone S A,et al.Optimal normal bases in GF(pn)[J].Dise Appl Math,1988/1989,22:149.
-
[2]
谭丽娟,陈运.模逆算法的分析、改进和测试[J].电子科技大学学报,2004,33(4):383.
-
[3]
王健,蒋安平,盛世敏.椭圆曲线加密体制的双有限域算法及其FPGA实现[J].北京大学学报:自然科学版,2008(6):873.
-
[4]
Schroepel R,Orman H,Malley S O',et al.Fask key exchange with elliptic curve systems,advances in cryptology[C]//Proc Crypto'95 LNCS963,Springer-Verlag,1995:43-56.
-
[5]
Kaliski B S.The montgomery inverse and its applications[J].IEEE Trans on Comp,1995,44(8):1064.
-
[6]
郝晓琴,徐赐文.椭圆曲线加密体制的有限域求模逆算法的改进[J].中央民族大学学报:自然科学版,2009,11(18):143.
-
[7]
徐茂智,游林.信息安全与密码学[M].北京:清华大学出版社,2007.
-
Proportional views
-
-