Elliptic curve scalar multiplication algorithm using complementary recoding

被引:23
|
作者
Balasubramaniam, P.
Karthikeyan, E. [1 ]
机构
[1] Gandhigram Rural Univ, Dept Comp Sci & Applicat, Dindigul 624302, Tamil Nadu, India
[2] Gandhigram Rural Univ, Dept Math, Dindigual 624302, Tamil Nadu, India
关键词
cryptography; signed binary method; complement recoding; window method; scalar multiplication;
D O I
10.1016/j.amc.2007.01.015
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Elliptic curve based cryptosystem is an efficient public key cryptosystem, which is more suitable for limited environments. The very expensive operation in elliptic curve based cryptographic protocol is the scalar multiplication. In this paper, scalar multiplication using complementary recoding method is proposed. The intermediate operations carried out in conversion are less than the other existing scalar multiplication algorithm. The efficiency of our proposed method is tested and found that our method is an efficient than the other methods. (C) 2007 Elsevier Inc. All rights reserved.
引用
收藏
页码:51 / 56
页数:6
相关论文
共 50 条
  • [21] Parallel and Regular Algorithm of Elliptic Curve Scalar Multiplication over Binary Fields
    Li, Xingran
    Yu, Wei
    Li, Bao
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020 (2020)
  • [22] Anti-Spa Scalar Multiplication Algorithm on Twisted Edwards Elliptic Curve
    Shuang-Gen, Liu
    Heng, Xin
    Yuan-Meng, Li
    Shuang-Gen, Liu (liusgxupt@163.com), 1600, Femto Technique Co., Ltd. (22): : 1015 - 1021
  • [23] Concurrent realization of the multiply-by-7 elliptic curve scalar multiplication algorithm
    Department of Electrical and Electronic Engineering, Faculty of Engineering, University of Lagos, Lagos, Nigeria
    不详
    Int. Conf. Internet Technol. Secured Trans., ICITST, 2011, (797-804):
  • [24] A new elliptic curve scalar multiplication algorithm to resist simple power analysis
    Hitchcock, Y
    Montague, P
    INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 214 - 225
  • [25] Faster Scalar Multiplication Algorithm to Implement a Secured Elliptic Curve Cryptography System
    Akhter, Fatema
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (01) : 639 - 644
  • [26] An improvement of both security and reliability for elliptic curve scalar multiplication Montgomery algorithm
    Bedoui, Mouna
    Bouallegue, Belgacem
    Mestiri, Hassen
    Hamdi, Belgacem
    Machhout, Mohsen
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (08) : 11973 - 11992
  • [27] An improvement of both security and reliability for elliptic curve scalar multiplication Montgomery algorithm
    Mouna Bedoui
    Belgacem Bouallegue
    Hassen Mestiri
    Belgacem Hamdi
    Mohsen Machhout
    Multimedia Tools and Applications, 2023, 82 : 11973 - 11992
  • [28] Elliptic curve point multiplication algorithm using precomputation
    Mimi, H. (hani_mimi@yahoo.com), 1600, World Scientific and Engineering Academy and Society, Ag. Ioannou Theologou 17-23, Zographou, Athens, 15773, Greece (12):
  • [29] Optimization of elliptic curve scalar multiplication using constraint based scheduling
    Zode, Pravin
    Deshmukh, Raghavendra
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2022, 167 : 232 - 239
  • [30] Implementation of an Elliptic Curve Scalar Multiplication Method Using Division Polynomials
    Kanayama, Naoki
    Liu, Yang
    Okamoto, Eiji
    Saito, Kazutaka
    Teruya, Tadanori
    Uchiyama, Shigenori
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2014, E97A (01) : 300 - 302