Four-Dimensional Gallant–Lambert–Vanstone Scalar Multiplication
نویسندگان
چکیده
منابع مشابه
High-Performance Scalar Multiplication Using 8-Dimensional GLV/GLS Decomposition
This paper explores the potential for using genus 2 curves over quadratic extension fields in cryptography, motivated by the fact that they allow for an 8-dimensional scalar decomposition when using a combination of the GLV/GLS algorithms. Besides lowering the number of doublings required in a scalar multiplication, this approach has the advantage of performing arithmetic operations in a 64-bit...
متن کاملWhen Is Scalar Multiplication Decidable?
Let K be a subfield of R. The theory of the ordered K-vector space R expanded by a predicate for Z is decidable if and only if K is a real quadratic field.
متن کاملDouble-base scalar multiplication revisited
This paper reduces the number of field multiplications required for scalar multiplication on conservative elliptic curves. For an average 256-bit integer n, this paper’s multiply-by-n algorithm takes just 7.47M per bit on twisted Edwards curves −x + y = 1 + dxy with small d. The previous record, 7.62M per bit, was unbeaten for seven years. Unlike previous record-setting algorithms, this paper’s...
متن کاملRenormalίzation Theory in Four Dimensional Scalar Fields (II)
We interpret the results of the preceding paper (I) in terms of partial resummations of the perturbative series for the effective interaction. As an application we sketch how our resummation method leads to a simple summation rule leading to a convergent expansion for the Schwinger functions of the planar Φ^-theory.
متن کاملAtomicity Improvement for Elliptic Curve Scalar Multiplication
Abstract. In this paper we address the problem of protecting elliptic curve scalar multiplication implementations against side-channel analysis by using the atomicity principle. First of all we reexamine classical assumptions made by scalar multiplication designers and we point out that some of them are not relevant in the context of embedded devices. We then describe the state-of-the-art of at...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Cryptology
سال: 2013
ISSN: 0933-2790,1432-1378
DOI: 10.1007/s00145-012-9144-3