Memory-constrained implementations of elliptic curve cryptography in co-Z coordinate representation

  • Authors:
  • Michael Hutter;Marc Joye;Yannick Sierra

  • Affiliations:
  • TU Graz, Institute for Applied Information Processing and Communications, Graz, Austria;Technicolor, Security & Content Protection Labs, Cesson-Sévigné Cedex, France;Oberthur Technologies, Nanterre Cedex, France

  • Venue:
  • AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
  • Year:
  • 2011

Quantified Score

Hi-index 0.02

Visualization

Abstract

It has been recently shown that sharing a common coordinate in elliptic curve cryptography implementations improves the performance of scalar multiplication. This paper presents new formulæ for elliptic curves over prime fields that provide efficient point addition and doubling using the Montgomery ladder. All computations are performed in a common projective Z-coordinate representation to reduce the memory requirements of low-resource implementations. In addition, all given formulæ make only use of out-of-place operations therefore insuring that it requires no additional memory for any implementation of the underlying finite-field operations whatsoever. Our results outperform existing solutions in terms of memory and speed and allow a fast and secure implementation suitable for low-resource devices and embedded systems.