Problem statement: Until recently, many addition chain techniques constructed to support scalar multiplication operation have been proposed tailored to limited computational resources. In securing the efficiency of ECC point operation, the combinations of the two basic operations, point addition and doubling are mostly implemented. Using binary method, the operation of doubling depends solely on the length of binary representation itself, so the most probable way to reduce the total number of the whole operation is by reducing the number of addition operation. This limitation is quite problematic. Approach: In this study we proposed an improved binary method which reads input block by block basis. Instead of having to add one to current cha...
Elliptic curves scalar multiplication over finite fields has become a highly active research area. T...
Abstract. The Double-Base Number System (DBNS) uses two bases, 2 and 3, in order to represent any in...
In this work, we propose an algorithm to produce the double-base chain that optimizes the time used ...
Abstract: Problem statement: Until recently, many addition chain techniques constructed to support s...
An efficient computation of scalar multiplication in elliptic curve cryptography can be achieved by ...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
The fast implementation of elliptic curve cryptosystems relies on the efficient computation of scala...
Abstract: Development and research in cryptography has shown that RSA and Diffie-Hellman has is beco...
Elliptic curves (EC) scalar multiplication over some finite fields, is an attractive research area, an...
Solutions to addition chain problem can be applied to operations involving huge number such as scala...
Abstract-Since the inception of elliptic curve cryptography by Koblitz [1] and Miller [2] for implem...
Elliptic curve scalar multiplication is the operation of successively adding a point along an ellipt...
The Double-Base Number System (DBNS) uses two bases, 2 and 3, in order to represent any integer n. A...
Among the various arithmetic operations required in implementing public key cryptographic algorithm...
Elliptic curves scalar multiplication over finite fields has become a highly active research area. T...
Abstract. The Double-Base Number System (DBNS) uses two bases, 2 and 3, in order to represent any in...
In this work, we propose an algorithm to produce the double-base chain that optimizes the time used ...
Abstract: Problem statement: Until recently, many addition chain techniques constructed to support s...
An efficient computation of scalar multiplication in elliptic curve cryptography can be achieved by ...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
The fast implementation of elliptic curve cryptosystems relies on the efficient computation of scala...
Abstract: Development and research in cryptography has shown that RSA and Diffie-Hellman has is beco...
Elliptic curves (EC) scalar multiplication over some finite fields, is an attractive research area, an...
Solutions to addition chain problem can be applied to operations involving huge number such as scala...
Abstract-Since the inception of elliptic curve cryptography by Koblitz [1] and Miller [2] for implem...
Elliptic curve scalar multiplication is the operation of successively adding a point along an ellipt...
The Double-Base Number System (DBNS) uses two bases, 2 and 3, in order to represent any integer n. A...
Among the various arithmetic operations required in implementing public key cryptographic algorithm...
Elliptic curves scalar multiplication over finite fields has become a highly active research area. T...
Abstract. The Double-Base Number System (DBNS) uses two bases, 2 and 3, in order to represent any in...
In this work, we propose an algorithm to produce the double-base chain that optimizes the time used ...