In this paper, we present the first constant-time implementations of four-dimensional Gallant–Lambert–Vanstone and Galbraith–Lin–Scott (GLV-GLS) scalar multiplication using curve Ted 127 - glv 4 on 8-bit AVR, 16-bit MSP430, and 32-bit ARM processors. In Asiacrypt 2012, Longa and Sica introduced the four-dimensional GLV-GLS scalar multiplication, and they reported the implementation results on Intel processors. However, they did not consider efficient implementations on resource-constrained embedded devices. We have optimized the performance of scalar multiplication using curve Ted 127 - glv 4 on 8-bit AVR, 16-bit MSP430, and 32-bit ARM processors. Our implementations compute a variable-base sc...
Abstract This paper presents new speed records for multi-precision multiplication on the AVR ATmega ...
This paper presents an area efficient and high-speed FPGA implementation of scalar multiplication us...
The higher computational complexity of an elliptic curve scalar point multiplication operation limit...
In this paper, we present the first constant-time implementations of four-dimensional Gallant–...
In this paper we present two classes of scalar multiplication hardware architectures that compute a ...
We propose efficient algorithms and formulas that improve the performance of side channel protected ...
National audienceThe scalar multiplication is the main operation of cryptographic protocols based on...
We propose efficient algorithms and formulas that improve the performance of side-channel protected ...
In this paper we present a scalar multiplication hardware architecture that computes a constant-time...
A new and highly efficient architecture for elliptic curve scalar point multiplication is presented....
This paper explores the potential for using genus~2 curves over quadratic extension fields in crypto...
peer reviewedSingle Instruction Multiple Data (SIMD) execution engines like Intel’s Advanced Vector ...
Single-Instruction-Multiple-Data (SIMD) extensions like Intel's AVX2 o er a great potential to accel...
Abstract. The verification of an ECDSA signature requires a double-base scalar multiplication, an op...
This article presents efficient hardware implementations for the gaussian normal basis multiplicatio...
Abstract This paper presents new speed records for multi-precision multiplication on the AVR ATmega ...
This paper presents an area efficient and high-speed FPGA implementation of scalar multiplication us...
The higher computational complexity of an elliptic curve scalar point multiplication operation limit...
In this paper, we present the first constant-time implementations of four-dimensional Gallant–...
In this paper we present two classes of scalar multiplication hardware architectures that compute a ...
We propose efficient algorithms and formulas that improve the performance of side channel protected ...
National audienceThe scalar multiplication is the main operation of cryptographic protocols based on...
We propose efficient algorithms and formulas that improve the performance of side-channel protected ...
In this paper we present a scalar multiplication hardware architecture that computes a constant-time...
A new and highly efficient architecture for elliptic curve scalar point multiplication is presented....
This paper explores the potential for using genus~2 curves over quadratic extension fields in crypto...
peer reviewedSingle Instruction Multiple Data (SIMD) execution engines like Intel’s Advanced Vector ...
Single-Instruction-Multiple-Data (SIMD) extensions like Intel's AVX2 o er a great potential to accel...
Abstract. The verification of an ECDSA signature requires a double-base scalar multiplication, an op...
This article presents efficient hardware implementations for the gaussian normal basis multiplicatio...
Abstract This paper presents new speed records for multi-precision multiplication on the AVR ATmega ...
This paper presents an area efficient and high-speed FPGA implementation of scalar multiplication us...
The higher computational complexity of an elliptic curve scalar point multiplication operation limit...