期刊文献+

一种定点快速标量乘算法的优化

Optimization of fast fixed point fast scalar multiplication algorithm
下载PDF
导出
摘要 标量乘法是实现椭圆曲线密码体制的瓶颈问题,利用NAF编码、预计算表法和Yen-Laih法分别在三个阶段对Lim-Lee算法进行优化,新的定点标量乘算法在赋值阶段动态扫描矩阵宽度为w的非全零列窗口,结合2kP底层域快速算法和扩充过的预计算表来提高计算效率。当位长是160时,新算法效率比Lim-Lee算法提高22.7%,192时提高23%,224时提高23.3%。 Scalar multiplication is the bottleneck of ECC.This paper optimizes the Lim-Lee algorithm with NAF method,precompute table and Yen-Lath method in three stages separately.The new fixed-point scalar multiplication algorithm dynamicly scans the matrix to get nonzero windows with length limited in w in the evaluation stage,and integrates with 2^kP field fast algorithm and extended pre-compute table to improve compute efficiency.When digit length is 160,the efficiency of new algorithm improves about 22.7% than Lim-Lee algorlthm,about 23% when 192 and 23.3% when 224.
出处 《计算机工程与应用》 CSCD 北大核心 2008年第4期80-82,共3页 Computer Engineering and Applications
基金 国家自然科学基金(the National Natural Science Foundation of China under Grant No.60473012) 江苏省六大人才高峰(No.06-E-025)
关键词 ECC 定点标量乘法 NAF编码 预计算表法 Yen-Laih法 EEC fixed-point scalar multiplication NAF method pre-compute table Yen-Lath method
  • 相关文献

参考文献9

  • 1Brickell E,Gordon D,McCurley K,et al,Fast exponentiation with precomputation[C].LNCS658:Advances in Cryptology-Eurocrypt'92. [S,l.] : Springer-Verlag, 1993 : 200-207.
  • 2Lim C H,Hwang H S.Speeding up elliptic scalar multiplication with precomputation [C].LNCS1787:Proceedings of the Second International Conference on Information Security and Cryptology.[S.l.]: Springer-Verlag, 1999 : 102-119.
  • 3Hankerson D,Hernandez J L,Menezes A.Software implementation of elliptic curve cryptography over binary field[C].Cryptographie Hardware and Embedded System-CHES 2000,Springer-Verlag, 2000,1965 : 1-24.
  • 4Fong K,Hankerson D,Hernandez J L,et al.Field inversion and point halving revisited[J].IEEE Transactions on Computers,2004, 53(8):1047-1059.
  • 5Dimitrov V S,Imbert L,Mishra P K.Fast elliptic curve point multiplication using double-base chains[EB/OL].[2005]Cryptology ePrint Archive, Report2005/069,http://eprint.iacr.org/.
  • 6Lim C H,Lee P.More flexible exponentiation with preeomputation[C].LNCS839:Advances in Cryptology-Crypto'94.[S.l.]:Springer-Verlag, 1994:95-107.
  • 7Joye M,Yen S M.Optimal left-to-right binary signed-digit recoding[J].IEEE Transactions on Computers,2000,49(7):740-748.
  • 8Yen S M,Laih C S.The fast cascade exponentiation algorithm and its application on eryptography[C].Advances in Cryptology-Auscypt'92, New York,Springer-Verlag, 1993:447-456.
  • 9Yasuyuki S,Kouichi S.Effieient scalar multiplications on elliptic curves with direct computations of several doublings[C].IEICE Trans Fundamentals, 2001, E84-a( 1 ) : 120-129.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部