메뉴 건너뛰기




Volumn E85-A, Issue 1, 2002, Pages 84-93

A scalar multiplication algorithm with recovery of the y-coordinate on the montgomery form and analysis of efficiency for elliptic curve cryptosystems

Author keywords

Elliptic curve cryptosystem; Fast scalar multiplication; Montgomery form; Y coordinate recovery

Indexed keywords

ALGORITHMS; COMPUTATIONAL METHODS; PROBLEM SOLVING; SMART CARDS;

EID: 0036454692     PISSN: 09168508     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Conference Paper
Times cited : (7)

References (27)
  • 2
    • 0003735741 scopus 로고    scopus 로고
    • Public key cryptography for the financial services industry
    • ANSI X9.62
    • ANSI X9.62, "Public key cryptography for the financial services industry," The Elliptic Curve Digital Signature Algorithm(ECDSA), 1999.
    • (1999) The Elliptic Curve Digital Signature Algorithm(ECDSA)
  • 3
    • 84957677506 scopus 로고    scopus 로고
    • Optimal extension fields for fast arithmetic in public-key algorithms
    • Advances in Cryptology-CRYPTO'98
    • D.V. Bailey and C. Paar, "Optimal extension fields for fast arithmetic in public-key algorithms," Advances in Cryptology-CRYPTO'98, LNCS1462, pp.472-485, 1998.
    • (1998) LNCS , vol.1462 , pp. 472-485
    • Bailey, D.V.1    Paar, C.2
  • 6
    • 84947743704 scopus 로고    scopus 로고
    • Efficient elliptic curve exponentiation using mixed coordinates
    • Advances in Cryptology-ASIACRYPT'98
    • H. Cohen, A. Miyaji, and T. Ono, "Efficient elliptic curve exponentiation using mixed coordinates," Advances in Cryptology-ASIACRYPT'98, LNCS1514, pp.51-65, 1998.
    • (1998) LNCS , vol.1514 , pp. 51-65
    • Cohen, H.1    Miyaji, A.2    Ono, T.3
  • 7
    • 0003202609 scopus 로고
    • A course in computational algebraic number theory
    • Springer-Verlag, New York
    • H. Cohen, A course in computational algebraic number theory, GTM138, Springer-Verlag, New York, 1993.
    • (1993) GTM , vol.138
    • Cohen, H.1
  • 8
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Trans. Inf. Theory, vol.31, no.4, pp.469-472, 1985.
    • (1985) IEEE Trans. Inf. Theory , vol.31 , Issue.4 , pp. 469-472
    • Elgamal, T.1
  • 12
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • N. Koblitz, "Elliptic curve cryptosystems," Math. Comp., vol.48, pp.203-209, 1987.
    • (1987) Math. Comp. , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 14
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • Advances in Cryptology-CRYPTO'96
    • C. Kocher, "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems," Advances in Cryptology-CRYPTO'96, LNCS1109, pp.104-113, 1996.
    • (1996) LNCS , vol.1109 , pp. 104-113
    • Kocher, C.1
  • 15
    • 84947913604 scopus 로고    scopus 로고
    • m) without precomputation
    • Cryptographic Hardware and Embedded Systems (CHES'99)
    • m) without precomputation," Cryptographic Hardware and Embedded Systems (CHES'99), LNCS1717, pp.316-327; 1999.
    • (1999) LNCS , vol.1717 , pp. 316-327
    • López, J.1    Dahab, R.2
  • 16
    • 84905916064 scopus 로고    scopus 로고
    • m)
    • Proc. PKC'00
    • m)," Proc. PKC'00 LNCS1751, pp.405-421, 2000.
    • (2000) LNCS , vol.1751 , pp. 405-421
    • Lim, C.H.1    Hwang, H.S.2
  • 17
    • 84955368946 scopus 로고
    • More flexible exponentiation with precomputation
    • Advances in Cryptology-CRYPTO'94
    • C. Lira and P. Lee, "More flexible exponentiation with precomputation," Advances in Cryptology-CRYPTO'94, LNCS839, pp.95-107, 1994.
    • (1994) LNCS , vol.839 , pp. 95-107
    • Lira, C.1    Lee, P.2
  • 18
    • 84957812088 scopus 로고    scopus 로고
    • Selecting cryptographic key sizes
    • Proc. PKC'00
    • A.K. Lenstra and E.R. Verheul, "Selecting cryptographic key sizes," Proc. PKC'00 LNCS1751, pp.446-465, 2000.
    • (2000) LNCS , vol.1751 , pp. 446-465
    • Lenstra, A.K.1    Verheul, E.R.2
  • 19
    • 85015402934 scopus 로고
    • Use of elliptic curves in cryptography
    • Advances in Cryptology-CRYPTO'85
    • V.S. Miller, "Use of elliptic curves in cryptography," Advances in Cryptology-CRYPTO'85, LNCS218, pp.417426, 1986.
    • (1986) LNCS , vol.218 , pp. 417-426
    • Miller, V.S.1
  • 20
    • 84968484435 scopus 로고
    • Speeding the pollard and elliptic curve methods of factorizations
    • P.L. Montgomery, "Speeding the pollard and elliptic curve methods of factorizations," Math. Comp. 48, pp.243-264, 1987.
    • (1987) Math. Comp. , vol.48 , pp. 243-264
    • Montgomery, P.L.1
  • 22
    • 0012022916 scopus 로고    scopus 로고
    • Elliptic curve signature scheme with no y coordinate
    • W4-1.3
    • K. Ohgishi, R. Sakai, and M. Kasahara, "Elliptic curve signature scheme with no y coordinate," Proc. SCIS'99, W4-1.3, pp.285-287, 1999.
    • (1999) Proc. SCIS'99 , pp. 285-287
    • Ohgishi, K.1    Sakai, R.2    Kasahara, M.3
  • 23
    • 84957794840 scopus 로고    scopus 로고
    • Elliptic curves with the Montgomery-form and their cryptographic applications
    • Public Key Cryptography (PKC2000)
    • K. Okeya, H. Kurumatani, and K. Sakurai, "Elliptic curves with the Montgomery-form and their cryptographic applications," Public Key Cryptography (PKC2000), LNCS1751, pp.238-257, 2000.
    • (2000) LNCS , vol.1751 , pp. 238-257
    • Okeya, K.1    Kurumatani, H.2    Sakurai, K.3
  • 24
    • 84947733936 scopus 로고    scopus 로고
    • Power analysis breaks elliptic curve cryptosystems even secure against the timing attack
    • Progress in Cryptology-INDOCRYPT 2000
    • K. Okeya and K. Sakurai, "Power analysis breaks elliptic curve cryptosystems even secure against the timing attack," Progress in Cryptology-INDOCRYPT 2000, LNCS1977, pp.178-190, 2000.
    • (2000) LNCS , vol.1977 , pp. 178-190
    • Okeya, K.1    Sakurai, K.2
  • 25
    • 85027128268 scopus 로고    scopus 로고
    • Standards for efficient cryptography
    • Standards for Efficient Cryptography, Elliptic Curve Cryptography Ver.1.0, 2000, Available at http://www.secg.org/secg_docs.htm.
    • (2000) Elliptic Curve Cryptography Ver.1.0


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.