We propose efficient algorithms and formulas that improve the performance of side-channel protected elliptic curve computations with special focus on scalar multiplication exploiting the Gallant-Lambert-Vanstone (CRYPTO 2001) and Galbraith-Lin-Scott (EUROCRYPT 2009) methods. Firstly, by adapting Feng et al.\u27s recoding to the GLV setting, we derive new regular algorithms for variable-base scalar multiplication that offer protection against simple side-channel and timing attacks. Secondly, we propose an efficient, side-channel protected algorithm for fixed-base scalar multiplication which combines Feng et al.\u27s recoding with Lim-Lee\u27s comb method. Thirdly, we propose an efficient technique that interleaves ARM and NEON-based multipre...
Accelerating scalar multiplication has always been a significant topic when people talk about the el...
This paper reduces the number of field multiplications required for scalar multiplication on conserv...
To secure parallel systems in communication networks, in this paper, we propose a fast and scalable ...
We propose efficient algorithms and formulas that improve the performance of side channel protected ...
This paper explores the potential for using genus~2 curves over quadratic extension fields in crypto...
Abstract. We present a new side-channel attack path threatening state-of-the-art protected implement...
This paper presents a series of Montgomery scalar multiplication algorithms on general short Weierst...
GLS254 is an elliptic curve defined over a finite field of characteristic 2; it contains a 253-bit p...
National audienceThe scalar multiplication is the main operation of cryptographic protocols based on...
Elliptic curve cryptography (ECC) is probably the most popular public key systems nowadays. The clas...
In [2], Gallant, Lambert and Vanstone proposed a very efficient algorithm to compute Q = kP on ellip...
The technology of elliptic curve cryptography is now an important branch in public-key based crypto-...
This paper presents the design and implementation of an elliptic curve cryptographic core to realize...
In this paper we present two classes of scalar multiplication hardware architectures that compute a ...
We design a state-of-the-art software implementation of field and elliptic curve arithmetic in stand...
Accelerating scalar multiplication has always been a significant topic when people talk about the el...
This paper reduces the number of field multiplications required for scalar multiplication on conserv...
To secure parallel systems in communication networks, in this paper, we propose a fast and scalable ...
We propose efficient algorithms and formulas that improve the performance of side channel protected ...
This paper explores the potential for using genus~2 curves over quadratic extension fields in crypto...
Abstract. We present a new side-channel attack path threatening state-of-the-art protected implement...
This paper presents a series of Montgomery scalar multiplication algorithms on general short Weierst...
GLS254 is an elliptic curve defined over a finite field of characteristic 2; it contains a 253-bit p...
National audienceThe scalar multiplication is the main operation of cryptographic protocols based on...
Elliptic curve cryptography (ECC) is probably the most popular public key systems nowadays. The clas...
In [2], Gallant, Lambert and Vanstone proposed a very efficient algorithm to compute Q = kP on ellip...
The technology of elliptic curve cryptography is now an important branch in public-key based crypto-...
This paper presents the design and implementation of an elliptic curve cryptographic core to realize...
In this paper we present two classes of scalar multiplication hardware architectures that compute a ...
We design a state-of-the-art software implementation of field and elliptic curve arithmetic in stand...
Accelerating scalar multiplication has always been a significant topic when people talk about the el...
This paper reduces the number of field multiplications required for scalar multiplication on conserv...
To secure parallel systems in communication networks, in this paper, we propose a fast and scalable ...