Among the various arithmetic operations required in implementing public key cryptographic algorithms, the elliptic curve point multiplication has probably received the maximum attention from the research community in the last decade. Many methods for e#cient and secure implementation of point multiplication have been proposed. The e#ciency of these methods mainly depends on the representation one uses for the scalar multiplier. In the current work we propose an e#cient algorithm based on the so-called double-base number system. We introduce the new concept of double-base chains which, if manipulated with care, can significantly reduce the complexity of scalar multiplication on elliptic curves. Besides we have adopted some other meas...
Elliptic curve scalar multiplication is the operation of successively adding a point along an ellipt...
Abstract: Development and research in cryptography has shown that RSA and Diffie-Hellman has is beco...
Problem statement: Until recently, many addition chain techniques constructed to support scalar mult...
The fast implementation of elliptic curve cryptosystems relies on the efficient computation of scala...
In this work, we propose an algorithm to produce the double-base chain that optimizes the time used ...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
Abstract. The Double-Base Number System (DBNS) uses two bases, 2 and 3, in order to represent any in...
Elliptic curves (EC) scalar multiplication over some finite fields, is an attractive research area, an...
Abstract. In this paper we propose to take one step back in the use of double base number systems fo...
Elliptic curves scalar multiplication over finite fields has become a highly active research area. T...
Abstract—Three algorithms for double-scalar multiplication on elliptic curves, based on the represen...
The Double-Base Number System (DBNS) uses two bases, 2 and 3, in order to represent any integer n. A...
Abstract-Since the inception of elliptic curve cryptography by Koblitz [1] and Miller [2] for implem...
We describe new fast algorithms for multiplying points on elliptic curves over finite fields of char...
Elliptic curve scalar multiplication is the operation of successively adding a point along an ellipt...
Abstract: Development and research in cryptography has shown that RSA and Diffie-Hellman has is beco...
Problem statement: Until recently, many addition chain techniques constructed to support scalar mult...
The fast implementation of elliptic curve cryptosystems relies on the efficient computation of scala...
In this work, we propose an algorithm to produce the double-base chain that optimizes the time used ...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
Abstract. The Double-Base Number System (DBNS) uses two bases, 2 and 3, in order to represent any in...
Elliptic curves (EC) scalar multiplication over some finite fields, is an attractive research area, an...
Abstract. In this paper we propose to take one step back in the use of double base number systems fo...
Elliptic curves scalar multiplication over finite fields has become a highly active research area. T...
Abstract—Three algorithms for double-scalar multiplication on elliptic curves, based on the represen...
The Double-Base Number System (DBNS) uses two bases, 2 and 3, in order to represent any integer n. A...
Abstract-Since the inception of elliptic curve cryptography by Koblitz [1] and Miller [2] for implem...
We describe new fast algorithms for multiplying points on elliptic curves over finite fields of char...
Elliptic curve scalar multiplication is the operation of successively adding a point along an ellipt...
Abstract: Development and research in cryptography has shown that RSA and Diffie-Hellman has is beco...
Problem statement: Until recently, many addition chain techniques constructed to support scalar mult...