Overview of Scalar Multiplication in Elliptic Curve Cryptography

被引:0
|
作者
Li, Ye [1 ]
Feng, Liu [1 ]
机构
[1] Southwest Univ, Dept Comp & Informat Sci, Chongqing, Peoples R China
关键词
Elliptic Curve Cryptography; Scalar Multiplication; inversion;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Scalar multiplication in elliptic curve cryptography is the most important part, its direct impact on the performance of the whole cryptosystem implementation. First of all, this article on the mathematical foundations of Elliptic Curve Cryptography Overview, respectively on excellent performance overview of scalar multiplication algorithm, including GF(p) over Prime fields using affine coordinates to scalar multiplication, and the scalar multiplication based on double base chain lines, the algorithm efficiency compared with Ciet, NAF classical algorithm, such as reducing the number of inversion, and Also made a lot of improvement on the algorithm itself.
引用
收藏
页码:2670 / 2673
页数:4
相关论文
共 50 条
  • [1] The elliptic scalar multiplication graph and its application in elliptic curve cryptography
    Aljamaly, Karrar Taher R.
    Ajeena, Ruma Kareem K.
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (06): : 1793 - 1807
  • [2] Signed Decomposition Method for Scalar Multiplication in Elliptic Curve Cryptography
    Said, M. R. M.
    Mohamed, M. A.
    Atan, K. A. Mohd
    Zulkarnain, Z. Ahmad
    [J]. ICMS: INTERNATIONAL CONFERENCE ON MATHEMATICAL SCIENCE, 2010, 1309 : 805 - +
  • [3] Combining Point Operations for Efficient Elliptic Curve Cryptography Scalar Multiplication
    Leca, Cristian-Liviu
    Rincu, Cristian-Iulian
    [J]. 2014 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2014,
  • [4] Fast Implementation for Modular Inversion and Scalar Multiplication in the Elliptic Curve Cryptography
    Ma, Shiwei
    Hao, Yuanling
    Pan, Zhongqiao
    Chen, Hui
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL II, PROCEEDINGS, 2008, : 488 - 492
  • [5] Lookup Table-Based Design of Scalar Multiplication for Elliptic Curve Cryptography
    Ning, Yan-Duan
    Chen, Yan-Haw
    Shih, Cheng-Sin
    Chu, Shao-, I
    [J]. CRYPTOGRAPHY, 2024, 8 (01)
  • [6] Optimization algorithm for scalar multiplication in the elliptic curve cryptography over prime field
    Hao, Yuanling
    Ma, Shiwei
    Chen, Guanghua
    Zhang, Xiaoli
    Chen, Hui
    Zeng, Weimin
    [J]. ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS, PROCEEDINGS: WITH ASPECTS OF THEORETICAL AND METHODOLOGICAL ISSUES, 2008, 5226 : 904 - +
  • [7] Radix-2w Arithmetic for Scalar Multiplication in Elliptic Curve Cryptography
    Oudjida, Abdelkrim Kamel
    Liacha, Ahmed
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2021, 68 (05) : 1979 - 1989
  • [8] Faster Scalar Multiplication Algorithm to Implement a Secured Elliptic Curve Cryptography System
    Akhter, Fatema
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (01) : 639 - 644
  • [9] Fuzzy Controller for a Dynamic Window in Elliptic Curve Cryptography Wireless Networks for Scalar Multiplication
    Huang, Xu
    Sharma, Dharmendra
    [J]. 2010 16TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC 2010), 2010, : 458 - 463
  • [10] A w-NNAF method for the efficient computation of scalar multiplication in elliptic curve cryptography
    Ding, Y
    Wong, KW
    Wang, YM
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (01) : 81 - 93