This paper explores the potential for using genus~2 curves over quadratic extension fields in cryptography, motivated by the fact that they allow for an 8-dimensional scalar decomposition when using a combination of the GLV/GLS algorithms. Besides lowering the number of doublings required in a scalar multiplication, this approach has the advantage of performing arithmetic operations in a 64-bit ground field, making it an attractive candidate for embedded devices. We found cryptographically secure genus 2 curves which, although susceptible to index calculus attacks, aim for the standardized 112-bit security level. Our implementation results on both high-end architectures (Ivy Bridge) and low-end ARM platforms (Cortex-A8) highlight the practi...
In [2], Gallant, Lambert and Vanstone proposed a very efficient algorithm to compute Q = kP on ellip...
We give a general framework for uniform, constant-time one-and two-dimensional scalar multiplication...
This paper reduces the number of field multiplications required for scalar multiplication on conserv...
In this paper we highlight the benefits of using genus 2 curves in public-key cryptography. Compared...
We propose efficient algorithms and formulas that improve the performance of side-channel protected ...
We propose efficient algorithms and formulas that improve the performance of side channel protected ...
In this paper we present two classes of scalar multiplication hardware architectures that compute a ...
GLS254 is an elliptic curve defined over a finite field of characteristic 2; it contains a 253-bit p...
Abstract-Since the inception of elliptic curve cryptography by Koblitz [1] and Miller [2] for implem...
We design a state-of-the-art software implementation of field and elliptic curve arithmetic in stand...
Elliptic Curve Cryptography (ECC) was independently introduced by Koblitz and Miller in the eighties...
National audienceThe scalar multiplication is the main operation of cryptographic protocols based on...
In this paper we present a scalar multiplication hardware architecture that computes a constant-time...
We propose a superscalar coprocessor for high-speed curvebased cryptography. It accelerates scalar m...
This paper presents a series of Montgomery scalar multiplication algorithms on general short Weierst...
In [2], Gallant, Lambert and Vanstone proposed a very efficient algorithm to compute Q = kP on ellip...
We give a general framework for uniform, constant-time one-and two-dimensional scalar multiplication...
This paper reduces the number of field multiplications required for scalar multiplication on conserv...
In this paper we highlight the benefits of using genus 2 curves in public-key cryptography. Compared...
We propose efficient algorithms and formulas that improve the performance of side-channel protected ...
We propose efficient algorithms and formulas that improve the performance of side channel protected ...
In this paper we present two classes of scalar multiplication hardware architectures that compute a ...
GLS254 is an elliptic curve defined over a finite field of characteristic 2; it contains a 253-bit p...
Abstract-Since the inception of elliptic curve cryptography by Koblitz [1] and Miller [2] for implem...
We design a state-of-the-art software implementation of field and elliptic curve arithmetic in stand...
Elliptic Curve Cryptography (ECC) was independently introduced by Koblitz and Miller in the eighties...
National audienceThe scalar multiplication is the main operation of cryptographic protocols based on...
In this paper we present a scalar multiplication hardware architecture that computes a constant-time...
We propose a superscalar coprocessor for high-speed curvebased cryptography. It accelerates scalar m...
This paper presents a series of Montgomery scalar multiplication algorithms on general short Weierst...
In [2], Gallant, Lambert and Vanstone proposed a very efficient algorithm to compute Q = kP on ellip...
We give a general framework for uniform, constant-time one-and two-dimensional scalar multiplication...
This paper reduces the number of field multiplications required for scalar multiplication on conserv...