In this article we present how we can use fast F_{p²} multiplication to speed-up arithmetic on elliptic curves. We use parallel computations for multiplication in F_{p²} which is not much slower than multiplication in F_{p}. We show two applications of this method. In the first we show that using twisted Edwards curves over F_{p²} with fast computable endomorphism (GLV-GLS method) may be nowadays on of the fastest (or even the fastest) solution in hardware applications. In the second we show how we can speed-up point scalar multiplication on NIST P-224 and NIST P-256 curves. We use field extension (F_{p²}) to find isomorphic to these curves twisted Hessian curves over F_{p²}. Our solution is faster than classic solutions up to 28.5% for NIS...
The BLS Digital Signature Algorithm is a cryptographic scheme using elliptic curves over finite fiel...
The technology of elliptic curve cryptography is now an important branch in public-key based crypto-...
This thesis deals with two topics: elliptic-curve cryptography and code-based cryptography. In 2007 ...
This article shows how to use fast Fp2 arithmetic and twisted Hessian curves to obtain faster point ...
In this paper we present a new method for fast scalar multiplication on elliptic curves over GF(p) i...
International audienceWe construct new families of elliptic curves over \(\FF_{p^2}\) with efficient...
International audienceWe give a detailed account of the use of $\mathbb{Q}$-curve reductions to cons...
This paper introduces fast algorithms for performing group operations on twisted Edwards curves, pus...
Abstract. Efficiently computable homomorphisms allow elliptic curve point multiplication to be accel...
GLS254 is an elliptic curve defined over a finite field of characteristic 2; it contains a 253-bit p...
This paper explores the potential for using genus~2 curves over quadratic extension fields in crypto...
We propose efficient algorithms and formulas that improve the performance of side-channel protected ...
Abstract. The fundamental operation in elliptic curve cryptographic schemes is the multiplication of...
In this work, we present new arithmetic formulas for a projective version of the affine point repres...
In this paper we highlight the benefits of using genus 2 curves in public-key cryptography. Compared...
The BLS Digital Signature Algorithm is a cryptographic scheme using elliptic curves over finite fiel...
The technology of elliptic curve cryptography is now an important branch in public-key based crypto-...
This thesis deals with two topics: elliptic-curve cryptography and code-based cryptography. In 2007 ...
This article shows how to use fast Fp2 arithmetic and twisted Hessian curves to obtain faster point ...
In this paper we present a new method for fast scalar multiplication on elliptic curves over GF(p) i...
International audienceWe construct new families of elliptic curves over \(\FF_{p^2}\) with efficient...
International audienceWe give a detailed account of the use of $\mathbb{Q}$-curve reductions to cons...
This paper introduces fast algorithms for performing group operations on twisted Edwards curves, pus...
Abstract. Efficiently computable homomorphisms allow elliptic curve point multiplication to be accel...
GLS254 is an elliptic curve defined over a finite field of characteristic 2; it contains a 253-bit p...
This paper explores the potential for using genus~2 curves over quadratic extension fields in crypto...
We propose efficient algorithms and formulas that improve the performance of side-channel protected ...
Abstract. The fundamental operation in elliptic curve cryptographic schemes is the multiplication of...
In this work, we present new arithmetic formulas for a projective version of the affine point repres...
In this paper we highlight the benefits of using genus 2 curves in public-key cryptography. Compared...
The BLS Digital Signature Algorithm is a cryptographic scheme using elliptic curves over finite fiel...
The technology of elliptic curve cryptography is now an important branch in public-key based crypto-...
This thesis deals with two topics: elliptic-curve cryptography and code-based cryptography. In 2007 ...