Trading Inversions for Multiplications in Elliptic Curve Cryptography

Mathieu Ciet1, Marc Joye2, Kristin Lauter3, Peter L. Montgomery3
1Gemplus S.A., Card Security Group, La Ciotat Cedex, France 13705#TAB#
2CIM-PACA, Centre de Micro-électronique de Provence – George Charpak, Gardanne, France
3Microsoft Research, One Microsoft Way, Redmond, USA

Tóm tắt

Từ khóa


Tài liệu tham khảo

IEEE Std 1363-2000, IEEE Standard Specifications for Public-Key Cryptography, IEEE Computer Society, August 29, 2000.

M. Brown, 2001, Topics in Cryptology – CT-RSA 2001, 250, 10.1007/3-540-45353-9_19

I. F. Blake, 2000, Elliptic Curves in Cryptography

H. Cohen, 1998, Advances in Cryptology – ASIACRYPT ’98., 51, 10.1007/3-540-49649-1_6

W. Diffie, 1976, IEEE Transactions on Information Theory, 22, 644, 10.1109/TIT.1976.1055638

K. Eisenträger, 2003, Topics in Cryptology – CT-RSA 2003, 343, 10.1007/3-540-36563-X_24

R.P. Gallant, 2001, Advances in Cryptology – CRYPTO 2001, 190, 10.1007/3-540-44647-8_11

T. ElGamal, 1985, IEEE Transactions on Information Theory, 31, 469, 10.1109/TIT.1985.1057074

D. M. Gordon, 1998, Journal of Algorithms, 27, 129, 10.1006/jagm.1997.0913

J. Guajardo, 1997, Advances in Cryptology – CRYPTO ’97, 342, 10.1007/BFb0052247

B. S. Kaliski Jr., 1995, IEEE Transactions on Computers, 44, 1064, 10.1109/12.403725

N. Koblitz, 1987, Mathematics of Computation, 48, 203, 10.1090/S0025-5718-1987-0866109-5

Ç. K. Koç and E. Savaş, Architectures for unified field inversion with applications in elliptic curve cryptography. In 9th IEEE International Conference on Electronics, Circuits and Systems (ICECS 2002), Dubrovnik, Croatia, 3 September 15–18 (2002) pp. 1155–1158.

C. H. Lim, 1994, Advances in Cryptology – CRYPTO ’94, 95, 10.1007/3-540-48658-5_11

J. López, 1999, Improved Algorithms for Elliptic Curve Arithmetic in GF(2n), Selected Areas in Cryptography – SAC ’98, 201

R. Lórencz, 2003, Cryptographic Hardware and Embedded Systems – CHES 2002, 57, 10.1007/3-540-36400-5_6

A. J. Menezes, 1997, Handbook of Applied Cryptography

V. S. Miller, 1986, Advances in Cryptology – CRYPTO’ 85, 417

B. Möller, private communication.

P. L. Montgomery, 1985, Mathematics of Computation, 44, 519, 10.1090/S0025-5718-1985-0777282-X

P. L. Montgomery, 1987, Mathematics of Computation, 48, 243, 10.1090/S0025-5718-1987-0866113-7

Y. Sakai, 2001, IEICE Transactions Fundamentals, E84-A, 120

E. Savaş, 2000, IEEE Transactions on Computers, 49, 763, 10.1109/12.863048

J. A. Solinas, Low-weight binary representations for pairs of integers, Tech. Report CORR 2001/41, CACR, Waterloo (2001).

E. G. Straus, 1964, American Mathematical Monthly, 70, 806