In this work we analyse the GLV method of Gallant, Lambert and Vanstone (CRYPTO 2001) which uses a fast endomorphism Phi with minimal polynomial X-2 + rX + s to compute any multiple kP of a point P of order n lying on an elliptic curve. First we fill in a gap in the proof of the bound of the kernel K vectors of the reduction map f : (i, j) --> i + gimelj (mod n). In particular, we prove the GLV decomposition with explicit constant kP = k(1)P + k(2)Phi(P), with max {k(1), k(2)} less than or equal to root1 + + srootn. Next we improve on this bound and give the best constant in the given examples for the quantity sup(k,n) max {k(1), k(2)}/rootn. Independently Park, Jeong, Kim, and Lim (PKC 2002) have given similar but slightly weaker bounds....
peer reviewedI generalize an idea of Gallant, Lambert, Vanstone for fast multiplication of points o...
In this work, we proposed a new approach called integer sub-decomposition (ISD) based on the GLV ide...
Elliptic curve cryptography has received more and more attention from the security industry over the...
Abstract. Efficiently computable homomorphisms allow elliptic curve point multiplication to be accel...
Point multiplication is the dominant operation in elliptic curve cryptosystems. Many techniques are ...
We discover that two distinct efficient endomorphisms can both exist on some Galbraith-Lin-Scott (GL...
aurore.guillevic a©ens.fr sorina.ionica a©m4x.org Abstract. The Gallant-Lambert-Vanstone (GLV) algor...
The Gallant-Lambert-Vanstone method accelerates the computation of scalar multiplication [k]P of a p...
Abstract. This paper presents the Gallant-Lambert-Vanstone method for speeding up scalar multiplicat...
Abstract. The group of m-torsion points on an elliptic curve, for a prime number m, forms a two-dime...
In order to obtain a fast multiplication on elliptic curves, the Gallant-Lambert-Vanstone(GLV) metho...
International audienceLet $q = 2^n$, and let $E / \mathbb{F}_{q^{\ell}}$ be a generalized Galbraith-...
International audienceWe give a detailed account of the use of $\mathbb{Q}$-curve reductions to cons...
Abstract. We give a detailed account of the use of Q-curve reductions to construct elliptic curves o...
In [2], Gallant, Lambert and Vanstone proposed a very efficient algorithm to compute Q = kP on ellip...
peer reviewedI generalize an idea of Gallant, Lambert, Vanstone for fast multiplication of points o...
In this work, we proposed a new approach called integer sub-decomposition (ISD) based on the GLV ide...
Elliptic curve cryptography has received more and more attention from the security industry over the...
Abstract. Efficiently computable homomorphisms allow elliptic curve point multiplication to be accel...
Point multiplication is the dominant operation in elliptic curve cryptosystems. Many techniques are ...
We discover that two distinct efficient endomorphisms can both exist on some Galbraith-Lin-Scott (GL...
aurore.guillevic a©ens.fr sorina.ionica a©m4x.org Abstract. The Gallant-Lambert-Vanstone (GLV) algor...
The Gallant-Lambert-Vanstone method accelerates the computation of scalar multiplication [k]P of a p...
Abstract. This paper presents the Gallant-Lambert-Vanstone method for speeding up scalar multiplicat...
Abstract. The group of m-torsion points on an elliptic curve, for a prime number m, forms a two-dime...
In order to obtain a fast multiplication on elliptic curves, the Gallant-Lambert-Vanstone(GLV) metho...
International audienceLet $q = 2^n$, and let $E / \mathbb{F}_{q^{\ell}}$ be a generalized Galbraith-...
International audienceWe give a detailed account of the use of $\mathbb{Q}$-curve reductions to cons...
Abstract. We give a detailed account of the use of Q-curve reductions to construct elliptic curves o...
In [2], Gallant, Lambert and Vanstone proposed a very efficient algorithm to compute Q = kP on ellip...
peer reviewedI generalize an idea of Gallant, Lambert, Vanstone for fast multiplication of points o...
In this work, we proposed a new approach called integer sub-decomposition (ISD) based on the GLV ide...
Elliptic curve cryptography has received more and more attention from the security industry over the...