Addition chain calculations play a critical role in determining the efficiency of cryptosystems based on isogenies on elliptic curves. However, finding a minimal length addition chain is not easy; a generalized version of the problem, in which one must find a chain that simultaneously forms each of a sequence of values, is NP-complete. For the special primes used in such cryptosystems, finding fast addition chains for finite field arithmetic such as inversion and square root is also not easy. In this paper, we investigate the shape of smooth isogeny primes and propose new methods to calculate fast addition chains. Further, we also provide techniques to reduce the temporary register consumption of these large exponentials, applicable to both...
Abstract. The Double-Base Number System (DBNS) uses two bases, 2 and 3, in order to represent any in...
The basic arithmetic operations (i.e. addition, multiplication, and inversion) in finite fields, GF ...
The Double-Base Number System (DBNS) uses two bases, 2 and 3, in order to represent any integer n. A...
Addition chain calculations play a critical role in determining the efficiency of cryptosystems base...
Solutions to addition chain problem can be applied to operations involving huge number such as scala...
An efficient computation of scalar multiplication in elliptic curve cryptography can be achieved by ...
Finding the shortest addition chain for a given exponent is a significant problem in cryptography. I...
In this paper we investigate various arithmetic techniques which can be used to potentially enhance ...
Field exponentiation and scalar multiplication are the pillars of and the most computationally expen...
In this paper, we describe an algorithm to compute chains of (2, 2)-isogenies between products of el...
Elliptic curves have played a large role in modern cryptography. Most notably, the Elliptic Curve Di...
AbstractThe problem of computing an explicit isogeny between two given elliptic curves over Fq, orig...
The isogeny-based cryptosystem is the most recent category in the field of postquantum cryptography....
International audienceThe problem of computing an explicit isogeny between two given elliptic curves...
In this work, we propose an algorithm to produce the double-base chain that optimizes the time used ...
Abstract. The Double-Base Number System (DBNS) uses two bases, 2 and 3, in order to represent any in...
The basic arithmetic operations (i.e. addition, multiplication, and inversion) in finite fields, GF ...
The Double-Base Number System (DBNS) uses two bases, 2 and 3, in order to represent any integer n. A...
Addition chain calculations play a critical role in determining the efficiency of cryptosystems base...
Solutions to addition chain problem can be applied to operations involving huge number such as scala...
An efficient computation of scalar multiplication in elliptic curve cryptography can be achieved by ...
Finding the shortest addition chain for a given exponent is a significant problem in cryptography. I...
In this paper we investigate various arithmetic techniques which can be used to potentially enhance ...
Field exponentiation and scalar multiplication are the pillars of and the most computationally expen...
In this paper, we describe an algorithm to compute chains of (2, 2)-isogenies between products of el...
Elliptic curves have played a large role in modern cryptography. Most notably, the Elliptic Curve Di...
AbstractThe problem of computing an explicit isogeny between two given elliptic curves over Fq, orig...
The isogeny-based cryptosystem is the most recent category in the field of postquantum cryptography....
International audienceThe problem of computing an explicit isogeny between two given elliptic curves...
In this work, we propose an algorithm to produce the double-base chain that optimizes the time used ...
Abstract. The Double-Base Number System (DBNS) uses two bases, 2 and 3, in order to represent any in...
The basic arithmetic operations (i.e. addition, multiplication, and inversion) in finite fields, GF ...
The Double-Base Number System (DBNS) uses two bases, 2 and 3, in order to represent any integer n. A...