An efficient computation of scalar multiplication in elliptic curve cryptography can be achieved by reducing the original problem into a chain of additions and doublings. Finding the shortest addition chain is an NP-problem. To produce the nearest possible shortest chain, various methods were introduced and most of them depends on the representation of a positive integer n into a binary form. Our method works out the given n by twice decomposition, first into its prime powers and second, for each prime into a series of 2's from which a set of rules based on addition and doubling is defined. Since prime factorization is computationally a hard problem, this method is only suitable for smooth integers. As an alternative, the need to decompose ...
In this work, we propose an algorithm to produce the double-base chain that optimizes the time used ...
Elliptic curve scalar multiplication is the operation of successively adding a point along an ellipt...
Among the various arithmetic operations required in implementing public key cryptographic algorithm...
Solutions to addition chain problem can be applied to operations involving huge number such as scala...
Problem statement: Until recently, many addition chain techniques constructed to support scalar mult...
Abstract: Problem statement: Until recently, many addition chain techniques constructed to support s...
The fast implementation of elliptic curve cryptosystems relies on the efficient computation of scala...
Abstract. The Double-Base Number System (DBNS) uses two bases, 2 and 3, in order to represent any in...
Addition chain calculations play a critical role in determining the efficiency of cryptosystems base...
The Double-Base Number System (DBNS) uses two bases, 2 and 3, in order to represent any integer n. A...
Cryptography via public key cryptosystems (PKC) has been widely used for providing services such as ...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
The major building block of most elliptic curve cryptosystems are computation of multi-scalar multip...
Because of shorter key and higher security, elliptic curve cryptosystem has attracted people’...
Elliptic curves scalar multiplication over finite fields has become a highly active research area. T...
In this work, we propose an algorithm to produce the double-base chain that optimizes the time used ...
Elliptic curve scalar multiplication is the operation of successively adding a point along an ellipt...
Among the various arithmetic operations required in implementing public key cryptographic algorithm...
Solutions to addition chain problem can be applied to operations involving huge number such as scala...
Problem statement: Until recently, many addition chain techniques constructed to support scalar mult...
Abstract: Problem statement: Until recently, many addition chain techniques constructed to support s...
The fast implementation of elliptic curve cryptosystems relies on the efficient computation of scala...
Abstract. The Double-Base Number System (DBNS) uses two bases, 2 and 3, in order to represent any in...
Addition chain calculations play a critical role in determining the efficiency of cryptosystems base...
The Double-Base Number System (DBNS) uses two bases, 2 and 3, in order to represent any integer n. A...
Cryptography via public key cryptosystems (PKC) has been widely used for providing services such as ...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
The major building block of most elliptic curve cryptosystems are computation of multi-scalar multip...
Because of shorter key and higher security, elliptic curve cryptosystem has attracted people’...
Elliptic curves scalar multiplication over finite fields has become a highly active research area. T...
In this work, we propose an algorithm to produce the double-base chain that optimizes the time used ...
Elliptic curve scalar multiplication is the operation of successively adding a point along an ellipt...
Among the various arithmetic operations required in implementing public key cryptographic algorithm...