Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Efficient Elliptic Curve Exponentiation Using Mixed Coordinates
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Elliptic Scalar Multiplication Using Point Halving
ASIACRYPT '99 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Weierstraß Elliptic Curves and Side-Channel Attacks
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
Fast Multiplication on Elliptic Curves over GF(2m) without Precomputation
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Guide to Elliptic Curve Cryptography
Guide to Elliptic Curve Cryptography
Extended double-base number system with applications to elliptic curve cryptography
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
Handbook of Elliptic and Hyperelliptic Curve Cryptography, Second Edition
Handbook of Elliptic and Hyperelliptic Curve Cryptography, Second Edition
Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Novel Precomputation Schemes for Elliptic Curve Cryptosystems
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
Elliptic Curve Scalar Multiplication Combining Yao's Algorithm and Double Bases
CHES '09 Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems
Co-Z addition formulæ and binary ladders on elliptic curves
CHES'10 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems
A public key cryptosystem based upon euclidean addition chains
SETA'10 Proceedings of the 6th international conference on Sequences and their applications
Memory-constrained implementations of elliptic curve cryptography in co-Z coordinate representation
AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
Atomicity improvement for elliptic curve scalar multiplication
CARDIS'10 Proceedings of the 9th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Application
Efficient precomputation schemes of kP+lQ
Information Processing Letters
Improved precomputation scheme for scalar multiplication on elliptic curves
IMACC'11 Proceedings of the 13th IMA international conference on Cryptography and Coding
RFIDSec'12 Proceedings of the 8th international conference on Radio Frequency Identification: security and privacy issues
Low-Cost countermeasure against RPA
CARDIS'12 Proceedings of the 11th international conference on Smart Card Research and Advanced Applications
Fault attacks on projective-to-affine coordinates conversion
COSADE'13 Proceedings of the 4th international conference on Constructive Side-Channel Analysis and Secure Design
Hi-index | 0.00 |
In this paper we propose a new approach to point scalar multiplication on elliptic curves defined over fields of characteristic greater than 3. It is based on new point addition formulae that suit very well to exponentiation algorithms based on Euclidean addition chains. However finding small chains remains a very difficult problem, so we also develop a specific exponentiation algorithm, based on Zeckendorf representation (i.e. representing the scalar kusing Fibonacci numbers instead of powers of 2), which takes advantage of our formulae.