Fast Implementation for Modular Inversion and Scalar Multiplication in the Elliptic Curve Cryptography

被引:5
|
作者
Ma, Shiwei [1 ]
Hao, Yuanling [1 ]
Pan, Zhongqiao [1 ]
Chen, Hui [1 ]
机构
[1] Shanghai Univ, Sch Mech Engn & Automat, Shanghai 200072, Peoples R China
关键词
D O I
10.1109/IITA.2008.392
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Modular inversion and Scalar multiplication are the kernel for computations in the GF(p) used by man), public-key cryptosystem in data security systems. Various algorithms have been used for both software and hardware implementation of GF (p) inversion, but its application is limited because of the constraint of its speed. In this paper, a fast GF(p) inversion algorithm is proposed which can be used in both software and hardware realizations and is particularly suitable for VLSI implementations. Also an efficient algorithm for scalar multiplication in ECC is discussed and the corresponding comparative results are given. The results of numerical tests and performance comparisons manifests that the proposed algorithms can remarkably improve the computational efficiency. Hence, it has practical significance for the implementation of ECC and is expected to be applied to data security.
引用
收藏
页码:488 / 492
页数:5
相关论文
共 50 条
  • [1] Overview of Scalar Multiplication in Elliptic Curve Cryptography
    Li, Ye
    Feng, Liu
    [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 2670 - 2673
  • [2] Highly Area-Efficient Implementation of Modular Multiplication for Elliptic Curve Cryptography
    Rahman, Md Sazedur
    Hossain, Md Selim
    [J]. 2020 IEEE REGION 10 SYMPOSIUM (TENSYMP) - TECHNOLOGY FOR IMPACTFUL SUSTAINABLE DEVELOPMENT, 2020, : 1078 - 1081
  • [3] Profiling Attack on Modular Multiplication of Elliptic Curve Cryptography
    Jiang, Kun
    Zhao, Bing
    Shan, Weijun
    Wang, Lihui
    Liu, Jing
    [J]. PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 233 - 236
  • [4] The elliptic scalar multiplication graph and its application in elliptic curve cryptography
    Aljamaly, Karrar Taher R.
    Ajeena, Ruma Kareem K.
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (06): : 1793 - 1807
  • [5] Area-Time Efficient Hardware Implementation of Modular Multiplication for Elliptic Curve Cryptography
    Islam, Md Mainul
    Hossain, Md Selim
    Shahjalal, Md
    Hasan, Moh Khalid
    Jang, Yeong Min
    [J]. IEEE ACCESS, 2020, 8 : 73898 - 73906
  • [6] Signed Decomposition Method for Scalar Multiplication in Elliptic Curve Cryptography
    Said, M. R. M.
    Mohamed, M. A.
    Atan, K. A. Mohd
    Zulkarnain, Z. Ahmad
    [J]. ICMS: INTERNATIONAL CONFERENCE ON MATHEMATICAL SCIENCE, 2010, 1309 : 805 - +
  • [7] Normal basis multiplication and inversion unit for elliptic curve cryptography
    Schmidt, J
    Novotny, M
    [J]. ICECS 2003: PROCEEDINGS OF THE 2003 10TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS, VOLS 1-3, 2003, : 80 - 83
  • [8] Parallelized Software Implementation of Elliptic Curve Scalar Multiplication
    Robert, Jean-Marc
    [J]. INFORMATION SECURITY AND CRYPTOLOGY (INSCRYPT 2014), 2015, 8957 : 445 - 462
  • [9] Analysis of Hardware Modular Inversion Modules for Elliptic Curve Cryptography
    Choi, Piljoo
    Kong, Jeong-Taek
    Kim, Dong Kyue
    [J]. 2015 INTERNATIONAL SOC DESIGN CONFERENCE (ISOCC), 2015, : 313 - 314
  • [10] Combining Point Operations for Efficient Elliptic Curve Cryptography Scalar Multiplication
    Leca, Cristian-Liviu
    Rincu, Cristian-Iulian
    [J]. 2014 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2014,