Improved elliptic curve scalar multiplication algorithm

被引:0
|
作者
Karthikeyan, E. [1 ,2 ]
Balasubramaniam, P. [2 ]
机构
[1] Deemed Univ, Gandhigram Rural Inst, Dept Comp Sci & Applicat, Dindigul 624302, Tamil Nadu, India
[2] Deemed Univ, Gandhigram Rural Inst, Dept Math, Dindigul 624302, Tamil Nadu, India
关键词
binary method; non-adjacent form; mutual opposite form; window method;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Scalar multiplication is the time consuming operation in elliptic curve based cryptosystem. In this paper, we extend the Shamir method to improve the speed of the scalar multiplication. Instead of non-adjacent form of integers, width-mutual opposite form of the same is used for the computation. The results we obtained from the proposed method significantly improve the performance of the elliptic curve exponentiation.
引用
收藏
页码:254 / +
页数:3
相关论文
共 50 条
  • [21] A new elliptic curve scalar multiplication algorithm to resist simple power analysis
    Hitchcock, Y
    Montague, P
    INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 214 - 225
  • [22] Faster Scalar Multiplication Algorithm to Implement a Secured Elliptic Curve Cryptography System
    Akhter, Fatema
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (01) : 639 - 644
  • [23] An improvement of both security and reliability for elliptic curve scalar multiplication Montgomery algorithm
    Bedoui, Mouna
    Bouallegue, Belgacem
    Mestiri, Hassen
    Hamdi, Belgacem
    Machhout, Mohsen
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (08) : 11973 - 11992
  • [24] An improvement of both security and reliability for elliptic curve scalar multiplication Montgomery algorithm
    Mouna Bedoui
    Belgacem Bouallegue
    Hassen Mestiri
    Belgacem Hamdi
    Mohsen Machhout
    Multimedia Tools and Applications, 2023, 82 : 11973 - 11992
  • [25] Low-Latency Elliptic Curve Scalar Multiplication
    Bos, Joppe W.
    INTERNATIONAL JOURNAL OF PARALLEL PROGRAMMING, 2012, 40 (05) : 532 - 550
  • [26] Elliptic Curve Scalar Multiplication with x-Coordinate
    ZHANG Ning1
    2. Ministry of Education Key Laboratory of Computer Networks and Information Security
    Wuhan University Journal of Natural Sciences, 2007, (01) : 163 - 166
  • [27] Analysis of Elliptic Curve Scalar Multiplication in Secure Communications
    Thomas, Christina
    Sheela, K. Gnana
    2015 GLOBAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (GCCT), 2015, : 611 - 615
  • [28] Pipelined computation of scalar multiplication in elliptic curve cryptosystems
    Mishra, PK
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 328 - 342
  • [29] Secure and Compact Elliptic Curve LR Scalar Multiplication
    Jin, Yaoan
    Miyaji, Atsuko
    INFORMATION SECURITY AND PRIVACY, ACISP 2020, 2020, 12248 : 605 - 618
  • [30] Parallelized Software Implementation of Elliptic Curve Scalar Multiplication
    Robert, Jean-Marc
    INFORMATION SECURITY AND CRYPTOLOGY (INSCRYPT 2014), 2015, 8957 : 445 - 462