Cantor versus Harley: Optimization and analysis of explicit formulae for hyperelliptic curve cryptosystems

被引:19
|
作者
Wollinger, T [1 ]
Pelzl, J [1 ]
Paar, C [1 ]
机构
[1] Ruhr Univ Bochum, Dept Elect Elect & Informat Sci, Commun Secur Grp COSY, D-44780 Bochum, Germany
关键词
hyperelliptic curves; explicit formulae; Harley's algorithm; Cantor; efficient implementation; embedded implementation;
D O I
10.1109/TC.2005.109
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Hyperelliptic curves (HEC) look promising for cryptographic applications, because of their short operand size compared to other public-key schemes. The operand sizes seem well suited for small processor architectures, where memory and speed are constrained. However, the group operation has been believed to be too complex and, thus, HEC have not been used in this context so far. In recent years, a lot of effort has been made to speed up group operation of genus-2 HEC. In this paper, we increase the efficiency of the genus-2 and genus-3 hyperelliptic curve cryptosystems (HECC). For certain genus-3 curves, we can gain almost 80 percent performance for a group doubling. This work not only improves Gaudry and Harley's algorithm [ 1], but also improves the original algorithm introduced by Cantor [ 2]. Contrary to common belief, we show that it is also practical for certain curves to use Cantor's algorithm to obtain the highest efficiency for the group operation. In addition, we introduce a general reduction method for polynomials according to Karatsuba. We implemented our most efficient group operations on Pentium and ARM microprocessors.
引用
收藏
页码:861 / 872
页数:12
相关论文
共 3 条
  • [1] Efficient explicit formulae for genus 3 hyperelliptic curve cryptosystems over binary fields
    Fan, X.
    Wollinger, T.
    Gong, G.
    [J]. IET INFORMATION SECURITY, 2007, 1 (02) : 65 - 81
  • [2] Countermeasures against differential power analysis for hyperelliptic curve cryptosystems
    Avanzi, RM
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS CHES 2003, PROCEEDINGS, 2003, 2779 : 366 - 381
  • [3] Performance Analysis of Various Optimization Techniques for Elliptic Curve Cryptosystems on Resource-Constrained Devices
    Bhatta, Jagdish
    Pandey, Lok Prakash
    [J]. 2015 9TH INTERNATIONAL CONFERENCE ON SOFTWARE, KNOWLEDGE, INFORMATION MANAGEMENT AND APPLICATIONS (SKIMA), 2015,