The paper is an examination of double-base decompositions of integers $n$, namely expansions loosely of the form $$ n = \sum_{i,j} A^iB^j $$ for some base $\{A,B\}$. This was examined in previous works in the case when $A,B$ lie in $\mathbb{N}$. On the positive side, we show how to extend previous results of to Koblitz curves over binary fields. Namely, we obtain a sublinear scalar algorithm to compute, given a generic positive integer $n$ and an elliptic curve point $P$, the point $nP$ in time $O\left(\frac{\log n}{\log\log n}\right)$ elliptic curve operations with essentially no storage, thus making the method asymptotically faster than any know scalar multiplication algorithm on Koblitz curves. On the negative side, we analyze scalar m...
The fast implementation of elliptic curve cryptosystems relies on the efficient computation of scala...
AbstractThe nonadjacent form method of Koblitz [Advances in Cryptology (CRYPTO'98), in: Lecture Note...
Elliptic curve cryptography (ECC) is a type of public-key cryptosystem which uses the additive group...
We design a state-of-the-art software implementation of field and elliptic curve arithmetic in stand...
Hyperelliptic curves over finite fields are used in cryptosystems. To reach better performance, Kobl...
Abstract—We address several algorithms to perform a double-scalar multiplication on an elliptic curv...
We address several algorithms to perform a double-scalar multiplication on an elliptic curve. All th...
This paper considers efficient scalar multiplication of elliptic curves over binary fields with a tw...
We consider digital expansions of scalars for supersingular Koblitz curves in characteristic three. ...
We present an algorithm that by using the τ and τ-1 Frobenius operators concurrently allows us to ob...
AbstractWe describe a method to perform scalar multiplication on two classes of ordinary elliptic cu...
Abstract. Given a positive integer n and a point P on an elliptic curve E, the computation of nP, th...
Hyperelliptic curves over finite fields are used in cryptosystems. To reach better performance, Kobl...
In this work, we retake an old idea that Koblitz presented in his landmark paper(Koblitz, in: Procee...
Part 2: Security EngineeringInternational audienceScalar multiplication is the most expensive arithm...
The fast implementation of elliptic curve cryptosystems relies on the efficient computation of scala...
AbstractThe nonadjacent form method of Koblitz [Advances in Cryptology (CRYPTO'98), in: Lecture Note...
Elliptic curve cryptography (ECC) is a type of public-key cryptosystem which uses the additive group...
We design a state-of-the-art software implementation of field and elliptic curve arithmetic in stand...
Hyperelliptic curves over finite fields are used in cryptosystems. To reach better performance, Kobl...
Abstract—We address several algorithms to perform a double-scalar multiplication on an elliptic curv...
We address several algorithms to perform a double-scalar multiplication on an elliptic curve. All th...
This paper considers efficient scalar multiplication of elliptic curves over binary fields with a tw...
We consider digital expansions of scalars for supersingular Koblitz curves in characteristic three. ...
We present an algorithm that by using the τ and τ-1 Frobenius operators concurrently allows us to ob...
AbstractWe describe a method to perform scalar multiplication on two classes of ordinary elliptic cu...
Abstract. Given a positive integer n and a point P on an elliptic curve E, the computation of nP, th...
Hyperelliptic curves over finite fields are used in cryptosystems. To reach better performance, Kobl...
In this work, we retake an old idea that Koblitz presented in his landmark paper(Koblitz, in: Procee...
Part 2: Security EngineeringInternational audienceScalar multiplication is the most expensive arithm...
The fast implementation of elliptic curve cryptosystems relies on the efficient computation of scala...
AbstractThe nonadjacent form method of Koblitz [Advances in Cryptology (CRYPTO'98), in: Lecture Note...
Elliptic curve cryptography (ECC) is a type of public-key cryptosystem which uses the additive group...