CRYPTOGRAPHY AND NETWORK SECURITY: Principles and Practice
Số trang: 588
Loại file: pdf
Dung lượng: 18.87 MB
Lượt xem: 8
Lượt tải: 0
Xem trước 10 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
For an equivalent level of security, elliptic curve cryptography uses shorter key sizes and isconsidered to be an excellent candidate for constrained environments like wireless/mobilecommunications. In FIPS 186-2, NIST recommends several finite fields to be used in theelliptic curve digital signature algorithm (ECDSA). Of the ten recommended finite fields,five are binary extension fields with degrees ranging from 163 to 571. The fundamentalbuilding block of the ECDSA, like any ECC based protocol, is elliptic curve scalar mul-tiplication. This operation is also the most computationally intensive. In many situationsit may be desirable to accelerate the elliptic curve scalar multiplication with specializedhardware....
Nội dung trích xuất từ tài liệu:
CRYPTOGRAPHY AND NETWORK SECURITY: Principles and Practice
Nội dung trích xuất từ tài liệu:
CRYPTOGRAPHY AND NETWORK SECURITY: Principles and Practice
Tìm kiếm theo từ khóa liên quan:
Information technology system administrators Security Policy Development Guide minimize risk set the rulesGợi ý tài liệu liên quan:
-
9 trang 60 0 0
-
Lecture Note Professional practices in information technology - Lecture No. 31: RiskManagement
5 trang 42 0 0 -
139 trang 39 0 0
-
Lecture Professional Practices in IT: Lecture 27
14 trang 39 0 0 -
Ebook Career paths: Information technology
16 trang 38 0 0 -
Ebook Financial management of the veterinary practice: Part 2
113 trang 38 0 0 -
231 trang 37 0 0
-
CCNA Explorationg 4.0 - Chapter 2 Static Routing
56 trang 37 0 0 -
C++?? A Critique of C++ and Programming and Language
63 trang 34 0 0 -
54 trang 33 0 0