Part 2: Security EngineeringInternational audienceIn 2010, Joye et. al brought the so-called Huff curve model, which was originally proposed in 1948 for the studies of diophantine equations, into the context of elliptic curve cryptography. Their initial work describes Huff curves over fields of large prime characteristic and details unified addition laws. Devigne and Joye subsequently extended the model to elliptic curves over binary fields and proposed fast differential addition formulas that are well-suited for use with the Montgomery ladder, which is a side-channel attack resistant scalar multiplication algorithm. Moreover, they showed that, in contrast to Huff curves over prime fields, it is possible to convert (almost) all binary Weier...
The Montgomery ladder is a remarkably simple method of computing scalar multiples of points on a bro...
This thesis deals with two topics: elliptic-curve cryptography and code-based cryptography. In 2007 ...
Elliptic curve cryptography has gained much popularity in the past decade and has been challenging t...
In this paper, we present the analysis of Huff curves for implementing isogeny-based cryptography. I...
The original publication is available at www.springerlink.comInternational audienceThis paper revisi...
In this survey paper we present a careful analysis of the Montgomery ladder procedure applied to the...
Elliptic curves have played a large role in modern cryptography. Most notably, the Elliptic Curve Di...
This paper presents a series of Montgomery scalar multiplication algorithms on general short Weierst...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
Abstract. Unified formula for computing elliptic curve point addition and doubling are considered to...
In order to compute the elliptic curve point addition and doubling, the unified point addition law p...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
International audienceThree decades ago, Montgomery introduced a new elliptic curve model for use in...
Elliptic Curve Cryptography (ECC) was independently introduced by Koblitz and Miller in the eighties...
Abstract-Since the inception of elliptic curve cryptography by Koblitz [1] and Miller [2] for implem...
The Montgomery ladder is a remarkably simple method of computing scalar multiples of points on a bro...
This thesis deals with two topics: elliptic-curve cryptography and code-based cryptography. In 2007 ...
Elliptic curve cryptography has gained much popularity in the past decade and has been challenging t...
In this paper, we present the analysis of Huff curves for implementing isogeny-based cryptography. I...
The original publication is available at www.springerlink.comInternational audienceThis paper revisi...
In this survey paper we present a careful analysis of the Montgomery ladder procedure applied to the...
Elliptic curves have played a large role in modern cryptography. Most notably, the Elliptic Curve Di...
This paper presents a series of Montgomery scalar multiplication algorithms on general short Weierst...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
Abstract. Unified formula for computing elliptic curve point addition and doubling are considered to...
In order to compute the elliptic curve point addition and doubling, the unified point addition law p...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
International audienceThree decades ago, Montgomery introduced a new elliptic curve model for use in...
Elliptic Curve Cryptography (ECC) was independently introduced by Koblitz and Miller in the eighties...
Abstract-Since the inception of elliptic curve cryptography by Koblitz [1] and Miller [2] for implem...
The Montgomery ladder is a remarkably simple method of computing scalar multiples of points on a bro...
This thesis deals with two topics: elliptic-curve cryptography and code-based cryptography. In 2007 ...
Elliptic curve cryptography has gained much popularity in the past decade and has been challenging t...