This paper presents a new fast scalar multiplication algorithm on elliptic curve cryptography. This algorithm greatly reduces times of addition operation which takes time for scalar multiplication algorithm by introducing signed and unsigned sliding window coding methods. By theoretic analysis and experiment, signed sliding window coding method is better than NAF algorithm and unsigned sliding window coding method, and it is also able to improve the efficiency of scalar multiplication algorithm compared with accustomed algorithm. And the optimal sliding window width is given.
This paper researches on Needham-Schroeder protocol with shared keys. It points out bugs and leaks that the protocol exists, and provids a kind of method to attack the protocol. Needham and Schroeder have revised the primitive protocol, but the amended protocol still has a leak. Some other scholars have revised this protocol too, but the amended protocol still is unsatisfactory. In allusion to bugs and leaks existing to the primitive protocol, the paper carries on corresponding modification, and analyses the amended protocol with BAN logic. It indicates that the amended protocol can reach the goal of the protocol.
Sequential algorithm is a straightforward cluster algorithm, and people do not have to provide the number of clusters in advance. However, when faced with large-scale data, the efficiency of the algorithm has need to be improved. Based on two-threshold sequential algorithm scheme(TTSAS), this article presents a new sequential algorithm TI_TTSAS, which avoids unnecessary distance calculations by applying the triangle inequality. Experiments show that the new algorithm is more effective for datasets of more dimensions, and becomes more and more effective as the number of clusters increases. The results keeps the accuracy of TTSAS algorithm.