The Selection Research of Security Elliptic Curve Cryptography in Packet Network Communication

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 269)


This paper studies the elliptic curve cryptography in a packet network communication security, the elliptic curve cryptosystem security elliptic curve select principles have been studied by several elliptic curve algorithm based on the analysis put forward the views of this article––that is, should be inclined to choose completely randomly generated by the ideal of security elliptic curve to construct the elliptic curve cryptosystem.


Packet network Security Elliptic curve 


  1. 1.
    Chen L, Bian Z-Z, WeiLi G (2002) The applications of elliptic curve public key cryptosystem in the security e-commerce. Comput Eng 5 Google Scholar
  2. 2.
    Shann CE (1949) Communication theory of secrecy systems. BellSystemTecnhiclaJournla 28(4):656–715Google Scholar
  3. 3.
    Li X-J, Jing Z-L, Dai G-Z (2002) Public key cryptography based on elliptic curve discrete logarithm problem. Comput Eng Appl 6:20–22Google Scholar
  4. 4.
    Wang J-M, Liu J-M (1999) Communication network security theory and technology. Xidian University press, Xi’anGoogle Scholar
  5. 5.
    Yu X (2007) Micro-processing structure research of special command block cipher. Microcomput Inf 9:84–86Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2014

Authors and Affiliations

  1. 1.School of Information Technology and EngineeringYuxi Normal UniversityYuxiChina

Personalised recommendations