메뉴 건너뛰기




Volumn 4779 LNCS, Issue , 2007, Pages 390-406

Efficient quintuple formulas for elliptic curves and efficient scalar multiplication using multibase number representation

Author keywords

Efficient curve arithmetic; Elliptic curve cryptosystems; Quintupling; Scalar multiplication

Indexed keywords

ALGORITHMS; COMPUTER SCIENCE; NUMBER THEORY;

EID: 38149003750     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-75496-1_26     Document Type: Conference Paper
Times cited : (47)

References (29)
  • 1
    • 33750740159 scopus 로고    scopus 로고
    • Scalar Multiplication on Koblitz Curves using Double Bases
    • Tech Report. Available at
    • Avanzi, R.M., Sica, F.: Scalar Multiplication on Koblitz Curves using Double Bases. Tech Report. Available at http://eprint.iacr.org/2006/067
    • Avanzi, R.M.1    Sica, F.2
  • 2
    • 77649268304 scopus 로고    scopus 로고
    • Extending Scalar Multiplication to Double Bases
    • Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
    • Avanzi, R.M., Dimitrov, V., Doche, C., Sica, F.: Extending Scalar Multiplication to Double Bases. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 130-144. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4284 , pp. 130-144
    • Avanzi, R.M.1    Dimitrov, V.2    Doche, C.3    Sica, F.4
  • 5
    • 23044483770 scopus 로고    scopus 로고
    • Blake, I.F, Seroussi, G, Smart, N.P, eds, Cambridge University Press, Cambridge
    • Blake, I.F., Seroussi, G., Smart, N.P. (eds.): Advances in Elliptic Curves Cryptography. Cambridge University Press, Cambridge (2005)
    • (2005) Advances in Elliptic Curves Cryptography
  • 6
    • 3042527150 scopus 로고    scopus 로고
    • Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity
    • Chevalier-Mames, B., Ciet, M., Joye, M.: Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity. IEEE Transactions on Computers 53(6), 760-768 (2004)
    • (2004) IEEE Transactions on Computers , vol.53 , Issue.6 , pp. 760-768
    • Chevalier-Mames, B.1    Ciet, M.2    Joye, M.3
  • 7
    • 33645106690 scopus 로고    scopus 로고
    • Trading inversions for multiplications in elliptic curve cryptography
    • Ciet, M., Lauter, K., Joye, M., Montgomery, P.L.: Trading inversions for multiplications in elliptic curve cryptography. Designs, Codes and Cryptography 39(2), 189-206 (2006)
    • (2006) Designs, Codes and Cryptography , vol.39 , Issue.2 , pp. 189-206
    • Ciet, M.1    Lauter, K.2    Joye, M.3    Montgomery, P.L.4
  • 8
    • 33646198552 scopus 로고    scopus 로고
    • Ciet, M., Sica, F.: An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, 3715, pp. 171-182. Springer, Heidelberg (2005)
    • Ciet, M., Sica, F.: An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol. 3715, pp. 171-182. Springer, Heidelberg (2005)
  • 9
    • 84947743704 scopus 로고    scopus 로고
    • Efficient Elliptic Curve Exponentiation Using Mixed coordinates
    • Ohta, K, Pei, D, eds, ASIACRYPT 1998, Springer, Heidelberg
    • Cohen, H., Miyaji, A., Ono, T.: Efficient Elliptic Curve Exponentiation Using Mixed coordinates. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 51-65. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1514 , pp. 51-65
    • Cohen, H.1    Miyaji, A.2    Ono, T.3
  • 10
    • 84880293917 scopus 로고    scopus 로고
    • Coron, J.-S.: Resistance against differential power analysis for elliptic curve cryptography. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, 1717, pp. 292-302. Springer, Heidelberg (1999)
    • Coron, J.-S.: Resistance against differential power analysis for elliptic curve cryptography. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 292-302. Springer, Heidelberg (1999)
  • 11
    • 0012342367 scopus 로고    scopus 로고
    • An Improvement of Guajardo-Paar Method for Multiplicar tion on non-supersingular Elliptic Curves
    • Antofagasta, Chile, November 12-14, IEEE Computer Society Press, Los Alamitos () 1998
    • Dahab, R., Lopez, J.: An Improvement of Guajardo-Paar Method for Multiplicar tion on non-supersingular Elliptic Curves. In: Proceedings of the XVIII International Conference of the Chilean Computer Science Society (SCCC 1998), Antofagasta, Chile, November 12-14, 1998, pp. 91-95. IEEE Computer Society Press, Los Alamitos (1998)
    • (1998) Proceedings of the XVIII International Conference of the Chilean Computer Science Society (SCCC , pp. 91-95
    • Dahab, R.1    Lopez, J.2
  • 12
    • 33646759248 scopus 로고    scopus 로고
    • Efficient and Secure Elliptic Curve Point Multiplication Using Double Base Chain
    • Roy, B, ed, ASIACRYPT 2005, Springer, Heidelberg
    • Dimitrov, V., Imbert, L., Mishra, P.K.: Efficient and Secure Elliptic Curve Point Multiplication Using Double Base Chain. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 59-79. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3788 , pp. 59-79
    • Dimitrov, V.1    Imbert, L.2    Mishra, P.K.3
  • 13
    • 33750681266 scopus 로고    scopus 로고
    • Dimitrov, V., Järvinen, K.U., Jacobson, M.J., Chan, W.F., Huang, Z.: FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, 4249, pp. 445-459. Springer, Heidelberg (2006)
    • Dimitrov, V., Järvinen, K.U., Jacobson, M.J., Chan, W.F., Huang, Z.: FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 445-459. Springer, Heidelberg (2006)
  • 16
    • 38149082675 scopus 로고    scopus 로고
    • Doche, C., Imbert, L.: Extended Double-Base Number System with applications to Elliptic Curve Cryptography. Tech Report, Conference version to appear in Indocrypt (2006), Available at http://eprint.iacr.org/2006/330
    • Doche, C., Imbert, L.: Extended Double-Base Number System with applications to Elliptic Curve Cryptography. Tech Report, Conference version to appear in Indocrypt (2006), Available at http://eprint.iacr.org/2006/330
  • 17
    • 33745856887 scopus 로고    scopus 로고
    • Doche, C., Icart, T., Kohel, D.: Efficient Scalar Multiplication by Isogeny Decompositions. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, 3958, pp. 191-206. Springer, Heidelberg (2006)
    • Doche, C., Icart, T., Kohel, D.: Efficient Scalar Multiplication by Isogeny Decompositions. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol. 3958, pp. 191-206. Springer, Heidelberg (2006)
  • 19
    • 38149023406 scopus 로고    scopus 로고
    • Guajardo, J., Paar, C.: Efficient Algorithms for Elliptic Curve Cryptosystems over binary fields. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, 1965, pp. 342-356. Springer, Heidelberg (2000)
    • Guajardo, J., Paar, C.: Efficient Algorithms for Elliptic Curve Cryptosystems over binary fields. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 342-356. Springer, Heidelberg (2000)
  • 21
    • 85099427145 scopus 로고    scopus 로고
    • Hankerson, D., Lòpez Hernandez, J., Menezes, A.: Software implementation of elliptic curve cryptography over binary fields. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, 1965, pp. 1-24. Springer, Heidelberg (2000)
    • Hankerson, D., Lòpez Hernandez, J., Menezes, A.: Software implementation of elliptic curve cryptography over binary fields. In: Paar, C., Koç, Ç.K. (eds.) CHES 2000. LNCS, vol. 1965, pp. 1-24. Springer, Heidelberg (2000)
  • 22
    • 84949515158 scopus 로고    scopus 로고
    • Itoh, K., Takenaka, M., Torii, N., Temma, S., Kurihara, Y.: Fast implementation of public-key cryptography on a DSP TMS320C6201. In: Koç, Ç.K., Paar, C (eds.) CHES 1999. LNCS, 1717, pp. 61-72. Springer, Heidelberg (1999)
    • Itoh, K., Takenaka, M., Torii, N., Temma, S., Kurihara, Y.: Fast implementation of public-key cryptography on a DSP TMS320C6201. In: Koç, Ç.K., Paar, C (eds.) CHES 1999. LNCS, vol. 1717, pp. 61-72. Springer, Heidelberg (1999)
  • 23
    • 27544457322 scopus 로고    scopus 로고
    • Fast elliptic curve multiplications resistant against side channel attacks
    • Izu, T., Takagi, T.: Fast elliptic curve multiplications resistant against side channel attacks. IEICE Transactions Fundamentals E88-A(1), 161-171 (2005)
    • (2005) IEICE Transactions Fundamentals , vol.E88-A , Issue.1 , pp. 161-171
    • Izu, T.1    Takagi, T.2
  • 24
    • 84944901711 scopus 로고    scopus 로고
    • Joye, M., Tymen, C.: Protections against differential analysis for elliptic curve cryptography - an algebraic approach. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, 2162, pp. 377-390. Springer, Heidelberg (2001)
    • Joye, M., Tymen, C.: Protections against differential analysis for elliptic curve cryptography - an algebraic approach. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 377-390. Springer, Heidelberg (2001)
  • 25
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation 48(177), 203-209 (1987)
    • (1987) Mathematics of Computation , vol.48 , Issue.177 , pp. 203-209
    • Koblitz, N.1
  • 26
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
    • Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104-113. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1109 , pp. 104-113
    • Kocher, P.C.1
  • 27
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Wiener, M.J, ed, CRYPTO 1999, Springer, Heidelberg
    • Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 388-397
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 28
    • 85015402934 scopus 로고
    • Uses of elliptic curves in cryptography
    • Williams, H.C ed, CRYPTO 1985, Springer, Heidelberg
    • Miller, V.S.: Uses of elliptic curves in cryptography. In: Williams, H.C (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417-428. Springer, Heidelberg (1986)
    • (1986) LNCS , vol.218 , pp. 417-428
    • Miller, V.S.1
  • 29
    • 0042775601 scopus 로고
    • On the maximal distance between integers composed of small primes
    • Tijdeman, R.: On the maximal distance between integers composed of small primes. Compositio Mathematica 28, 159-162 (1974)
    • (1974) Compositio Mathematica , vol.28 , pp. 159-162
    • Tijdeman, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.