We propose efficient algorithms and formulas that improve the performance of side channel protected elliptic curve computations with special focus on scalar multiplication exploiting the Gallant-Lambert-Vanstone (CRYPTO 2001) and Galbraith-Lin-Scott (EUROCRYPT 2009) methods. Firstly, by adapting Feng et al.’s recoding to the GLV setting, we derive new regular algorithms for variable-base scalar multiplication that offer protection against simple side-channel and timing attacks. Secondly, we propose an efficient, sidechannel protected algorithm for fixed-base scalar multiplication which combines Feng et al.’s recoding with Lim-Lee’s comb method. Thirdly, we propose an efficient technique that interleaves ARM and NEON-based multiprecision ope...
Abstract. GLV curves (Gallant et al.) have performance advantages over standard elliptic curves, usi...
Elliptic curve cryptography has gained much popularity in the past decade and has been challenging t...
In this paper, we present the first constant-time implementations of four-dimensional Gallant–...
We propose efficient algorithms and formulas that improve the performance of side-channel protected ...
This paper explores the potential for using genus~2 curves over quadratic extension fields in crypto...
Abstract. We present a new side-channel attack path threatening state-of-the-art protected implement...
In [2], Gallant, Lambert and Vanstone proposed a very efficient algorithm to compute Q = kP on ellip...
National audienceThe scalar multiplication is the main operation of cryptographic protocols based on...
To secure parallel systems in communication networks, in this paper, we propose a fast and scalable ...
Accelerating scalar multiplication has always been a significant topic when people talk about the el...
Abstract-Since the inception of elliptic curve cryptography by Koblitz [1] and Miller [2] for implem...
ISBN : 978-3-662-45610-1International audienceThe fastest implementations of elliptic curve cryptogr...
In this paper we present two classes of scalar multiplication hardware architectures that compute a ...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
Point multiplication is the dominant operation in elliptic curve cryptosystems. Many techniques are ...
Abstract. GLV curves (Gallant et al.) have performance advantages over standard elliptic curves, usi...
Elliptic curve cryptography has gained much popularity in the past decade and has been challenging t...
In this paper, we present the first constant-time implementations of four-dimensional Gallant–...
We propose efficient algorithms and formulas that improve the performance of side-channel protected ...
This paper explores the potential for using genus~2 curves over quadratic extension fields in crypto...
Abstract. We present a new side-channel attack path threatening state-of-the-art protected implement...
In [2], Gallant, Lambert and Vanstone proposed a very efficient algorithm to compute Q = kP on ellip...
National audienceThe scalar multiplication is the main operation of cryptographic protocols based on...
To secure parallel systems in communication networks, in this paper, we propose a fast and scalable ...
Accelerating scalar multiplication has always been a significant topic when people talk about the el...
Abstract-Since the inception of elliptic curve cryptography by Koblitz [1] and Miller [2] for implem...
ISBN : 978-3-662-45610-1International audienceThe fastest implementations of elliptic curve cryptogr...
In this paper we present two classes of scalar multiplication hardware architectures that compute a ...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
Point multiplication is the dominant operation in elliptic curve cryptosystems. Many techniques are ...
Abstract. GLV curves (Gallant et al.) have performance advantages over standard elliptic curves, usi...
Elliptic curve cryptography has gained much popularity in the past decade and has been challenging t...
In this paper, we present the first constant-time implementations of four-dimensional Gallant–...