Elliptic curves have played a large role in modern cryptography. Most notably, the Elliptic Curve Digital Signature Algorithm (ECDSA) and the Elliptic Curve Diffie-Hellman (ECDH) key exchange algorithm are widely used in practice today for their efficiency and small key sizes. More recently, the Supersingular Isogeny-based Diffie-Hellman (SIDH) algorithm provides a method of exchanging keys which is conjectured to be secure in the post-quantum setting. For ECDSA and ECDH, efficient and secure algorithms for scalar multiplication of points are necessary for modern use of these protocols. Likewise, in SIDH it is necessary to be able to compute an isogeny from a given finite subgroup of an elliptic curve in a fast and secure fashion. We theref...
A multidimensional scalar multiplication (d-mul) consists of computing $[a_1]P_1+\cdots+[a_d]P_d$,...
International audienceWe describe an implementation of fast elliptic curve scalar multiplication, op...
The fast implementation of elliptic curve cryptosystems relies on the efficient computation of scala...
In this paper we investigate various arithmetic techniques which can be used to potentially enhance ...
Abstract-Since the inception of elliptic curve cryptography by Koblitz [1] and Miller [2] for implem...
Part 2: Security EngineeringInternational audienceIn 2010, Joye et. al brought the so-called Huff cu...
Elliptic curve scalar multiplication is the operation of successively adding a point along an ellipt...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
Elliptic curves scalar multiplication over finite fields has become a highly active research area. T...
We derive a new formula for computing arbitrary odd-degree isogenies between elliptic curves in Mont...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
Elliptic curve cryptography has gained much popularity in the past decade and has been challenging t...
Since its introduction by Jao and De Feo in 2011, the supersingular isogeny Diffie-Hellman (SIDH) ke...
This paper introduces ‘hyper-and-elliptic-curve cryptography’, in which a single high-security group...
Elliptic curves (EC) scalar multiplication over some finite fields, is an attractive research area, an...
A multidimensional scalar multiplication (d-mul) consists of computing $[a_1]P_1+\cdots+[a_d]P_d$,...
International audienceWe describe an implementation of fast elliptic curve scalar multiplication, op...
The fast implementation of elliptic curve cryptosystems relies on the efficient computation of scala...
In this paper we investigate various arithmetic techniques which can be used to potentially enhance ...
Abstract-Since the inception of elliptic curve cryptography by Koblitz [1] and Miller [2] for implem...
Part 2: Security EngineeringInternational audienceIn 2010, Joye et. al brought the so-called Huff cu...
Elliptic curve scalar multiplication is the operation of successively adding a point along an ellipt...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
Elliptic curves scalar multiplication over finite fields has become a highly active research area. T...
We derive a new formula for computing arbitrary odd-degree isogenies between elliptic curves in Mont...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
Elliptic curve cryptography has gained much popularity in the past decade and has been challenging t...
Since its introduction by Jao and De Feo in 2011, the supersingular isogeny Diffie-Hellman (SIDH) ke...
This paper introduces ‘hyper-and-elliptic-curve cryptography’, in which a single high-security group...
Elliptic curves (EC) scalar multiplication over some finite fields, is an attractive research area, an...
A multidimensional scalar multiplication (d-mul) consists of computing $[a_1]P_1+\cdots+[a_d]P_d$,...
International audienceWe describe an implementation of fast elliptic curve scalar multiplication, op...
The fast implementation of elliptic curve cryptosystems relies on the efficient computation of scala...