In this paper we present a new method for fast scalar multiplication on elliptic curves over GF(p) in FPGA using Edwards and twisted Edwards curves over GF(p³). The presented solution works for curves with prime group order (for example for all NIST curves over GF(p)). It is possible because of using 2-isogenous twisted Edwards curves over GF(p³) instead of using short Weierstrass curves over GF(p) for point scalar multiplication. This problem was considered by Verneuil in [1], but in software solutions it is useless, because multiplication in GF(p³) is much harder than multiplication in GF(p). Fortunately in hardware solutions it is possible to make in FPGA fast multiplication in GF(p³) using parallel computations. Single multiplication in...
Nowadays, elliptic curve cryptosystems are widely distributed. Its fundamental operation is scalar m...
We propose efficient algorithms and formulas that improve the performance of side-channel protected ...
This paper presents the design and implementation of an elliptic curve cryptographic core to realize...
In this article we present how we can use fast F_{p²} multiplication to speed-up arithmetic on ellip...
This article shows how to use fast Fp2 arithmetic and twisted Hessian curves to obtain faster point ...
Abstract. We present a new hardware architecture to compute scalar multiplications in the group of r...
This paper introduces fast algorithms for performing group operations on twisted Edwards curves, pus...
The technology of elliptic curve cryptography is now an important branch in public-key based crypto-...
We introduce a set of four twisted Edwards curves that satisfy common security requirements and allo...
This paper presents a series of Montgomery scalar multiplication algorithms on general short Weierst...
Elliptic curve cryptosystems offer security comparable to that of traditional asymmetric cryptosyste...
In this work, we present new arithmetic formulas for a projective version of the affine point repres...
Scalar multiplication on Legendre form elliptic curves can be speeded up in two ways. One can perfor...
This paper considers efficient scalar multiplication of elliptic curves over binary fields with a tw...
Abstract-Since the inception of elliptic curve cryptography by Koblitz [1] and Miller [2] for implem...
Nowadays, elliptic curve cryptosystems are widely distributed. Its fundamental operation is scalar m...
We propose efficient algorithms and formulas that improve the performance of side-channel protected ...
This paper presents the design and implementation of an elliptic curve cryptographic core to realize...
In this article we present how we can use fast F_{p²} multiplication to speed-up arithmetic on ellip...
This article shows how to use fast Fp2 arithmetic and twisted Hessian curves to obtain faster point ...
Abstract. We present a new hardware architecture to compute scalar multiplications in the group of r...
This paper introduces fast algorithms for performing group operations on twisted Edwards curves, pus...
The technology of elliptic curve cryptography is now an important branch in public-key based crypto-...
We introduce a set of four twisted Edwards curves that satisfy common security requirements and allo...
This paper presents a series of Montgomery scalar multiplication algorithms on general short Weierst...
Elliptic curve cryptosystems offer security comparable to that of traditional asymmetric cryptosyste...
In this work, we present new arithmetic formulas for a projective version of the affine point repres...
Scalar multiplication on Legendre form elliptic curves can be speeded up in two ways. One can perfor...
This paper considers efficient scalar multiplication of elliptic curves over binary fields with a tw...
Abstract-Since the inception of elliptic curve cryptography by Koblitz [1] and Miller [2] for implem...
Nowadays, elliptic curve cryptosystems are widely distributed. Its fundamental operation is scalar m...
We propose efficient algorithms and formulas that improve the performance of side-channel protected ...
This paper presents the design and implementation of an elliptic curve cryptographic core to realize...