The fast implementation of elliptic curve cryptosystems relies on the efficient computation of scalar multiplication. Based on the double-base chain representation of scalar using powers of 2 and 3, we propose a new representation with powers of ½ and 3 instead. Thus the efficient point halving operation can be incorporated in the new double-base chain to achieve fast scalar multiplication. Experimental results show that our approach leads to a lower complexity which contributes to the efficient implementation of elliptic curve cryptosystems
Abstract. The Double-Base Number System (DBNS) uses two bases, 2 and 3, in order to represent any in...
In this paper we compare the computational complexity of two parallel scalar multiplication methods ...
Elliptic curve scalar multiplication is the operation of successively adding a point along an ellipt...
Among the various arithmetic operations required in implementing public key cryptographic algorithm...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
Abstract-Since the inception of elliptic curve cryptography by Koblitz [1] and Miller [2] for implem...
In this work, we propose an algorithm to produce the double-base chain that optimizes the time used ...
Elliptic curves (EC) scalar multiplication over some finite fields, is an attractive research area, an...
Accelerating scalar multiplication has always been a significant topic when people talk about the el...
Because of shorter key and higher security, elliptic curve cryptosystem has attracted people’...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
Elliptic curves scalar multiplication over finite fields has become a highly active research area. T...
Problem statement: Until recently, many addition chain techniques constructed to support scalar mult...
Elliptic curve cryptosystem (ECC) is being used nowadays more than ever to fulfill the need for pu...
To secure parallel systems in communication networks, in this paper, we propose a fast and scalable ...
Abstract. The Double-Base Number System (DBNS) uses two bases, 2 and 3, in order to represent any in...
In this paper we compare the computational complexity of two parallel scalar multiplication methods ...
Elliptic curve scalar multiplication is the operation of successively adding a point along an ellipt...
Among the various arithmetic operations required in implementing public key cryptographic algorithm...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
Abstract-Since the inception of elliptic curve cryptography by Koblitz [1] and Miller [2] for implem...
In this work, we propose an algorithm to produce the double-base chain that optimizes the time used ...
Elliptic curves (EC) scalar multiplication over some finite fields, is an attractive research area, an...
Accelerating scalar multiplication has always been a significant topic when people talk about the el...
Because of shorter key and higher security, elliptic curve cryptosystem has attracted people’...
Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Intern...
Elliptic curves scalar multiplication over finite fields has become a highly active research area. T...
Problem statement: Until recently, many addition chain techniques constructed to support scalar mult...
Elliptic curve cryptosystem (ECC) is being used nowadays more than ever to fulfill the need for pu...
To secure parallel systems in communication networks, in this paper, we propose a fast and scalable ...
Abstract. The Double-Base Number System (DBNS) uses two bases, 2 and 3, in order to represent any in...
In this paper we compare the computational complexity of two parallel scalar multiplication methods ...
Elliptic curve scalar multiplication is the operation of successively adding a point along an ellipt...