In this paper, we focus on developing a high-speed square root (SQRT) algorithm required for an elliptic curve cryptosystem. Examining Smart algorithm, the previously well-known SQRT algorithm, we can see that there is a lot of computation overlap in Smart algorithm and the quadratic residue (QR) test, which must be implemented prior to a SQRT computation. It makes Smart algorithm inefficient. The essence of our proposition is thus to present a new QR test and an efficient SQRT algorithm to avoid all the overlapping computations. The authors devised a SQRT algorithm for which most of the data required have been computed in the proposed QR test. Not only there is no computation overlap in the proposed algorithm and the proposed QR test, but ...
This thesis studies the secure polynomial multiplication methods related to the article Batch Binary...
Abstract. We present fast and compact implementations of FourQ (ASI-ACRYPT 2015) on field-programmab...
Abstract-Since the inception of elliptic curve cryptography by Koblitz [1] and Miller [2] for implem...
In this paper, we focus on developing a high-speed square root (SQRT) algorithm required for an elli...
The BLS Digital Signature Algorithm is a cryptographic scheme using elliptic curves over finite fiel...
In this thesis, we are mainly interested in constructing deterministic polynomial-time algorithms fo...
Efficient implementation of elliptic curve cryptography can be targeted at 2 levels, specifically on...
We describe new fast algorithms for multiplying points on elliptic curves over finite fields of char...
In this paper, a fast hardware architecture for elliptic curve cryptography computation in Galois Fi...
In this paper, we propose fast finite field and elliptic curve (EC) algorithms useful for embedding ...
Theoretical thesis.Bibliography: pages 207-215.1. Introduction -- 2. Background -- 3. RNS arithmetic...
In this paper, we present memory-efficient and scalable implementations of NIST standardized ellipti...
The security of the most popular asymmetric cryptographic scheme RSA depends on the hardness of fact...
The subject of the thesis at hand is the description of an efficient algorithm for finding an ellipt...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
This thesis studies the secure polynomial multiplication methods related to the article Batch Binary...
Abstract. We present fast and compact implementations of FourQ (ASI-ACRYPT 2015) on field-programmab...
Abstract-Since the inception of elliptic curve cryptography by Koblitz [1] and Miller [2] for implem...
In this paper, we focus on developing a high-speed square root (SQRT) algorithm required for an elli...
The BLS Digital Signature Algorithm is a cryptographic scheme using elliptic curves over finite fiel...
In this thesis, we are mainly interested in constructing deterministic polynomial-time algorithms fo...
Efficient implementation of elliptic curve cryptography can be targeted at 2 levels, specifically on...
We describe new fast algorithms for multiplying points on elliptic curves over finite fields of char...
In this paper, a fast hardware architecture for elliptic curve cryptography computation in Galois Fi...
In this paper, we propose fast finite field and elliptic curve (EC) algorithms useful for embedding ...
Theoretical thesis.Bibliography: pages 207-215.1. Introduction -- 2. Background -- 3. RNS arithmetic...
In this paper, we present memory-efficient and scalable implementations of NIST standardized ellipti...
The security of the most popular asymmetric cryptographic scheme RSA depends on the hardness of fact...
The subject of the thesis at hand is the description of an efficient algorithm for finding an ellipt...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
This thesis studies the secure polynomial multiplication methods related to the article Batch Binary...
Abstract. We present fast and compact implementations of FourQ (ASI-ACRYPT 2015) on field-programmab...
Abstract-Since the inception of elliptic curve cryptography by Koblitz [1] and Miller [2] for implem...