期刊文献+

TWO FAST ALGORITHMS FOR COMPUTING POINT SCALAR MULTIPLICATIONS ON ELLIPTIC CURVES 被引量:1

TWO FAST ALGORITHMS FOR COMPUTING POINT SCALAR MULTIPLICATIONS ON ELLIPTIC CURVES
下载PDF
导出
摘要 The key operation in Elliptic Curve Cryptosystems(ECC) is point scalar multiplication. Making use of Frobenius endomorphism, Muller and Smart proposed two efficient algorithms for point scalar multiplications over even or odd finite fields respectively. This paper reduces the corresponding multiplier by modulo Υk-1 +…+Υ+ 1 and improves the above algorithms. Implementation of our Algorithm 1 in Maple for a given elliptic curve shows that it is at least as twice fast as binary method. By setting up a precomputation table, Algorithm 2, an improved version of Algorithm 1, is proposed. Since the time for the precomputation table can be considered free, Algorithm 2 is about (3/2) log2 q - 1 times faster than binary method for an elliptic curve over The key operation in Elliptic Curve Cryptosystems(ECC) is point scalar multiplication. Making use of Frobenius endomorphism, Miiller and Smart proposed two efficient algorithms for point scalar multiplications over even or odd finite fields respectively. This paper reduces thementation of our Algorithm 1 in Maple for a given elliptic curve shows that it is at least as twice fast as binary method. By setting up a precomputation table, Algorithm 2, an improved version of Algorithm 1, is proposed. Since the time for the precomputation table can be considered free,Algorithm 2 is about (3/2) log2 q - 1 times faster than binary method for an elliptic curve over Fq.
出处 《Journal of Electronics(China)》 2004年第5期366-375,共10页 电子科学学刊(英文版)
基金 Supported by the National Natural Science Foundation of China(No.90104004) the National 973 High Technology Projects(No.G1998030420)
关键词 Frobenius endomorphism Frobenius expansion Point scalar multiplication Binary method 椭圆曲线 自同态 点标量乘法 二元方法 ECC 密码
  • 相关文献

参考文献1

  • 1N. P. Smart.Elliptic Curve Cryptosystems over Small Fields of Odd Characteristic[J].Journal of Cryptology.1999(2)

同被引文献2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部