This paper discusses representations for computation on non-supersingular elliptic curves over binary fields, where computations are performed on the x-coordinates only. We discuss existing methods and present a new one, giving rise to a faster addition routine than previous Montgomery-representations. As a result a double exponentiation routine is described that requires 8.5 field multiplications per exponent bit, but that does not allow easy y-coordinate recovery. For comparison, we also give a briefu pdate oft he survey by Hankerson et al. and conclude that, for non-constrained devices, using a Montgomeryrepresentation is slower for both single and double exponentiation than projective methods with y-coordinate
We describe new fast algorithms for multiplying points on elliptic curves over finite fields of char...
Abstract. In elliptic curve cryptosystems, scalar multiplications performed on the curves have much ...
International audienceWe introduce the twisted mu(4)-normal form for elliptic curves, deriving in pa...
This paper discusses representations for computation on non-supersingular elliptic curves over binar...
Abstract. From the viewpoint of x-coordinate-only arithmetic on ellip-tic curves, switching between ...
International audienceThree decades ago, Montgomery introduced a new elliptic curve model for use in...
Hyperelliptic curves of low genus obtained a lot of attention in the recent past for cryptographic a...
Abstract. It has been recently shown that sharing a common coordi-nate in elliptic curve cryptograph...
Edwards recently introduced a new normal form for elliptic curves. Every elliptic curve over a non-b...
Abstract. It has been recently shown that sharing a common coordi-nate in elliptic curve cryptograph...
This paper presents a new shape for ordinary elliptic curves over fields of characteristic 2. Using ...
The use of precomputed data to speed up a cryptographic protocol is commonplace. For instance, the o...
Abstract-Since the inception of elliptic curve cryptography by Koblitz [1] and Miller [2] for implem...
We describe new fast algorithms for multiplying points on elliptic curves over finite fields of char...
Abstract. In elliptic curve cryptosystems, scalar multiplications performed on the curves have much ...
International audienceWe introduce the twisted mu(4)-normal form for elliptic curves, deriving in pa...
This paper discusses representations for computation on non-supersingular elliptic curves over binar...
Abstract. From the viewpoint of x-coordinate-only arithmetic on ellip-tic curves, switching between ...
International audienceThree decades ago, Montgomery introduced a new elliptic curve model for use in...
Hyperelliptic curves of low genus obtained a lot of attention in the recent past for cryptographic a...
Abstract. It has been recently shown that sharing a common coordi-nate in elliptic curve cryptograph...
Edwards recently introduced a new normal form for elliptic curves. Every elliptic curve over a non-b...
Abstract. It has been recently shown that sharing a common coordi-nate in elliptic curve cryptograph...
This paper presents a new shape for ordinary elliptic curves over fields of characteristic 2. Using ...
The use of precomputed data to speed up a cryptographic protocol is commonplace. For instance, the o...
Abstract-Since the inception of elliptic curve cryptography by Koblitz [1] and Miller [2] for implem...
We describe new fast algorithms for multiplying points on elliptic curves over finite fields of char...
Abstract. In elliptic curve cryptosystems, scalar multiplications performed on the curves have much ...
International audienceWe introduce the twisted mu(4)-normal form for elliptic curves, deriving in pa...