In this work, we present new arithmetic formulas for a projective version of the affine point representation $(x,x+y/x),$ for $x\ne 0,$ which leads to an efficient computation of the scalar multiplication operation over binary elliptic curves.A software implementation of our formulas applied to a binary Galbraith-Lin-Scott elliptic curve defined over the field $\mathbb{F}_{2^{254}}$ allows us to achieve speed records for protected/unprotected single/multi-core random-point elliptic curve scalar multiplication at the 127-bit security level. When executed on a Sandy Bridge 3.4GHz Intel Xeon processor, our software is able to compute a single/multi-core unprotected scalar multiplication in $69,500$ and $47,900$ clock cycles, respectively; and ...
We introduce a set of four twisted Edwards curves that satisfy common security requirements and allo...
The use of precomputed data to speed up a cryptographic protocol is commonplace. For instance, the o...
Abstract-Since the inception of elliptic curve cryptography by Koblitz [1] and Miller [2] for implem...
GLS254 is an elliptic curve defined over a finite field of characteristic 2; it contains a 253-bit p...
This paper considers efficient scalar multiplication of elliptic curves over binary fields with a tw...
In this paper we present two classes of scalar multiplication hardware architectures that compute a ...
The technology of elliptic curve cryptography is now an important branch in public-key based crypto-...
Binary elliptic curves are elliptic curves defined over finite fields of characteristic 2. On softwa...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
We design a state-of-the-art software implementation of field and elliptic curve arithmetic in stand...
In this paper we present a new method for fast scalar multiplication on elliptic curves over GF(p) i...
In this survey paper we present a careful analysis of the Montgomery ladder procedure applied to the...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
National audienceThe scalar multiplication is the main operation of cryptographic protocols based on...
In this article we present how we can use fast F_{p²} multiplication to speed-up arithmetic on ellip...
We introduce a set of four twisted Edwards curves that satisfy common security requirements and allo...
The use of precomputed data to speed up a cryptographic protocol is commonplace. For instance, the o...
Abstract-Since the inception of elliptic curve cryptography by Koblitz [1] and Miller [2] for implem...
GLS254 is an elliptic curve defined over a finite field of characteristic 2; it contains a 253-bit p...
This paper considers efficient scalar multiplication of elliptic curves over binary fields with a tw...
In this paper we present two classes of scalar multiplication hardware architectures that compute a ...
The technology of elliptic curve cryptography is now an important branch in public-key based crypto-...
Binary elliptic curves are elliptic curves defined over finite fields of characteristic 2. On softwa...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
We design a state-of-the-art software implementation of field and elliptic curve arithmetic in stand...
In this paper we present a new method for fast scalar multiplication on elliptic curves over GF(p) i...
In this survey paper we present a careful analysis of the Montgomery ladder procedure applied to the...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
National audienceThe scalar multiplication is the main operation of cryptographic protocols based on...
In this article we present how we can use fast F_{p²} multiplication to speed-up arithmetic on ellip...
We introduce a set of four twisted Edwards curves that satisfy common security requirements and allo...
The use of precomputed data to speed up a cryptographic protocol is commonplace. For instance, the o...
Abstract-Since the inception of elliptic curve cryptography by Koblitz [1] and Miller [2] for implem...