Because of shorter key and higher security, elliptic curve cryptosystem has attracted people’s attention and it is widely used in various fields, such as wireless sensor networks. Scalar multiplication is one of the most basic and critical links in the realization of elliptic curve public key systems, and its operation efficiency directly affects the implementation efficiency of the entire cryptographic system. To improve speed up the efficiency of the scalar multiplication algorithm, we express $k $ for scalar multiplication $kP $ by using triple-base chain representation of the scalar using $\{2,3,7\} $ as basis of the triple-base chain in this paper. However, the efficiency of scalar multiplication is not only related to the...
Problem statement: Until recently, many addition chain techniques constructed to support scalar mult...
Abstract. Recently, Eisenträger et al. proposed a very elegant method for speeding up scalar multipl...
The major building block of most elliptic curve cryptosystems are computation of multi-scalar multip...
The fast implementation of elliptic curve cryptosystems relies on the efficient computation of scala...
Elliptic curves scalar multiplication over finite fields has become a highly active research area. T...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
In the current work we propose two efficient formulas for computing the 5-fold (5P) of an elliptic c...
Elliptic curve scalar multiplication is the operation of successively adding a point along an ellipt...
Accelerating scalar multiplication has always been a significant topic when people talk about the el...
In this work, we propose an algorithm to produce the double-base chain that optimizes the time used ...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
Among the various arithmetic operations required in implementing public key cryptographic algorithm...
In this paper we compare the computational complexity of two parallel scalar multiplication methods ...
Elliptic curve cryptography has gained much popularity in the past decade and has been challenging t...
Elliptic curves (EC) scalar multiplication over some finite fields, is an attractive research area, an...
Problem statement: Until recently, many addition chain techniques constructed to support scalar mult...
Abstract. Recently, Eisenträger et al. proposed a very elegant method for speeding up scalar multipl...
The major building block of most elliptic curve cryptosystems are computation of multi-scalar multip...
The fast implementation of elliptic curve cryptosystems relies on the efficient computation of scala...
Elliptic curves scalar multiplication over finite fields has become a highly active research area. T...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
In the current work we propose two efficient formulas for computing the 5-fold (5P) of an elliptic c...
Elliptic curve scalar multiplication is the operation of successively adding a point along an ellipt...
Accelerating scalar multiplication has always been a significant topic when people talk about the el...
In this work, we propose an algorithm to produce the double-base chain that optimizes the time used ...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
Among the various arithmetic operations required in implementing public key cryptographic algorithm...
In this paper we compare the computational complexity of two parallel scalar multiplication methods ...
Elliptic curve cryptography has gained much popularity in the past decade and has been challenging t...
Elliptic curves (EC) scalar multiplication over some finite fields, is an attractive research area, an...
Problem statement: Until recently, many addition chain techniques constructed to support scalar mult...
Abstract. Recently, Eisenträger et al. proposed a very elegant method for speeding up scalar multipl...
The major building block of most elliptic curve cryptosystems are computation of multi-scalar multip...