Addition chain heuristics in application to elliptic curve cryptosystems
The idea of an addition chain can be applied to scalar multiplication involving huge number operations in elliptic curve cryptosystems. In this article, initially, we study the taxonomy of the addition chain problem to build up an understanding of the problem. We then examine the mathematics behind...
| Main Authors: | Mohamed, Mohamad Afendee, Shawai, Yahaya Garba, Derahman, Mohd Noor, Mamat, Abd Rasid, Mohd Satar, Siti Dhalila, Amri Abidin, Ahmad Faisal, Abdul Kadir, Mohd Fadzil |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Intelektual Pustaka Media Utama
2024
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/113090/ http://psasir.upm.edu.my/id/eprint/113090/1/113090.pdf |
Similar Items
On the Improvement of Addition Chain in Applications to Elliptic Curve Cryptosystem
Status: Submitted
by: Mohamed, Mohamad Afendee
Published: (2011)
by: Mohamed, Mohamad Afendee
Published: (2011)
Multi-Threading Elliptic Curve Cryptosystems.
by: Kanniah, Uma S., et al.
Published: (2007)
by: Kanniah, Uma S., et al.
Published: (2007)
A review on heuristics for addition chain problem: towards efficient public key cryptosystems
by: Muhammad Noma, Adamu, et al.
Published: (2017)
by: Muhammad Noma, Adamu, et al.
Published: (2017)
A lucas based cryptosystem analog to the ElGamal cryptosystem and elliptic curve cryptosystem
by: Wong, Tze Jin, et al.
Published: (2014)
by: Wong, Tze Jin, et al.
Published: (2014)
A survey on elliptic curve cryptography
by: Mohamed, Mohamad Afendee
Published: (2014)
by: Mohamed, Mohamad Afendee
Published: (2014)
On the mathematical complexity and the time implementation
of proposed variants of elliptic curves cryptosystems
by: Al-Saffar, Najlae F. Hameed, et al.
Published: (2013)
by: Al-Saffar, Najlae F. Hameed, et al.
Published: (2013)
Securing the image through the combination of elliptic curve cryptosystem and hill cipher encryption
by: Sulaiman, Saniah
Published: (2019)
by: Sulaiman, Saniah
Published: (2019)
Design and performance evaluation of parallel elliptic curve cryptosystem with GF(P) projective coordinates
by: Hussein Fayiz, Mohammad Al-Khatib
Published: (2012)
by: Hussein Fayiz, Mohammad Al-Khatib
Published: (2012)
On the wiener's attack into lucas based El-gamal cryptosystem in the elliptic curve over finite field
by: Wong, Tze Jin, et al.
Published: (2018)
by: Wong, Tze Jin, et al.
Published: (2018)
An analysis for chosen plaintext attack in elliptic curve cryptosystem based on second order lucas sequence
by: Koo, Lee Feng, et al.
Published: (2019)
by: Koo, Lee Feng, et al.
Published: (2019)
{0, 1, 3}-NAF representation and algorithms for lightweight elliptic curve cryptosystem in Lopez Dahab model
by: Md. Yasin, Sharifah, et al.
Published: (2014)
by: Md. Yasin, Sharifah, et al.
Published: (2014)
Lucas based el-gamal cryptosystem in the elliptic curve group over finite field under lenstras attack
by: Tze, Jin Wong, et al.
Published: (2018)
by: Tze, Jin Wong, et al.
Published: (2018)
Enhancement of {0, 1, 3}-NAF Recoding Algorithm using Block Method Technique for Elliptic Curve Cryptosystem
by: Bafandehkar, Mohsen
Published: (2015)
by: Bafandehkar, Mohsen
Published: (2015)
An improved binary method for scalar multiplication in elliptic curve cryptography
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
Computation of cryptosystem based on Lucas functions using addition chain
by: Md Ali, Zulkarnain, et al.
Published: (2010)
by: Md Ali, Zulkarnain, et al.
Published: (2010)
Common modulus attack against Lucas based El-Gamal Cryptosystem in the elliptic curve group over finite field
by: Koo, Lee Feng, et al.
Published: (2018)
by: Koo, Lee Feng, et al.
Published: (2018)
Garbage-man-in-the-middle (type 2) attack on the Lucas based El-Gamal cryptosystem in the elliptic curve group over finite field
by: Sarbini, Izzatul Nabila, et al.
Published: (2018)
by: Sarbini, Izzatul Nabila, et al.
Published: (2018)
A new addition formula for elliptic curves over GF(2/sup n/)
by: Al-Daoud, E., et al.
Published: (2002)
by: Al-Daoud, E., et al.
Published: (2002)
Numerical modular symbols for elliptic curves
by: Wuthrich, Christian
Published: (2017)
by: Wuthrich, Christian
Published: (2017)
Anabelian geometry of punctured elliptic curves
by: Porowski, Wojciech
Published: (2020)
by: Porowski, Wojciech
Published: (2020)
Security analysis of Lucas based El-Gamal Cryptosystem in the elliptic curve group over finite field using two types of GMITM attacks
by: Sarbini, Izzatul Nabila, et al.
Published: (2018)
by: Sarbini, Izzatul Nabila, et al.
Published: (2018)
Kolyvagin Derivatives of Modular Points on Elliptic Curves
by: Hatton, Richard
Published: (2020)
by: Hatton, Richard
Published: (2020)
Committal deniable signatures over elliptic curves
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
Hardware architectures & designs for projective elliptic curves point addition operation using variable levels of parallelism
by: Al-Khatib, Mohammad Hussein Fayiz, et al.
Published: (2011)
by: Al-Khatib, Mohammad Hussein Fayiz, et al.
Published: (2011)
Vanishing of some Galois cohomology groups for elliptic curves
by: Lawson, Tyler, et al.
Published: (2016)
by: Lawson, Tyler, et al.
Published: (2016)
A new encryption algorithm over elliptic curve
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
An improved public key cryptography based on the elliptic curve
by: Al-Daoud, Essam Faleh
Published: (2002)
by: Al-Daoud, Essam Faleh
Published: (2002)
Encrypting text data using elliptic curve cryptography
by: Ali, Abas Abdullahi
Published: (2018)
by: Ali, Abas Abdullahi
Published: (2018)
High performance methods of elliptic curve scalar multiplication
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2014)
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2014)
Improved arithmetic on elliptic curves over prime field
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2014)
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2014)
Elliptic net scalar multiplication upon Koblitz curves
by: Muslim, Norliana, et al.
Published: (2020)
by: Muslim, Norliana, et al.
Published: (2020)
Signed decomposition method for scalar multiplication in elliptic curve cryptography
by: Md. Said, Mohamad Rushdan, et al.
Published: (2010)
by: Md. Said, Mohamad Rushdan, et al.
Published: (2010)
Stochastic heuristic approach to addition chain problem in PKC for efficiency and security effectiveness
by: Noma, Adamu Muhammad, et al.
Published: (2019)
by: Noma, Adamu Muhammad, et al.
Published: (2019)
Improved algorithms of elliptic curve point multiplication over binary and prime fields using elliptic net
by: Muslim, Norliana
Published: (2022)
by: Muslim, Norliana
Published: (2022)
On the design of projective binary Edwards elliptic curves over GF (p) benefitting from mapping elliptic curves computation to variable degree of parallel design
by: Al-Khatib, Mohammad Hussein Fayiz, et al.
Published: (2011)
by: Al-Khatib, Mohammad Hussein Fayiz, et al.
Published: (2011)
Challenges in data representation for efficient execution of encryption operation
by: Afendee Mohamed, Mohamad, et al.
Published: (2024)
by: Afendee Mohamed, Mohamad, et al.
Published: (2024)
Robust and secure image steganography based on elliptic curve cryptography
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
Modular forms and elliptic curves over imaginary
quadratic fields
by: Lingham, Mark Peter
Published: (2005)
by: Lingham, Mark Peter
Published: (2005)
K1-congruences between L-values of elliptic curves
by: Ward, Thomas
Published: (2009)
by: Ward, Thomas
Published: (2009)
Key exchange in elliptic curve cryptography based on the decomposition problem
by: Hilyati Hanina Zazali,, et al.
Published: (2012)
by: Hilyati Hanina Zazali,, et al.
Published: (2012)
Similar Items
-
On the Improvement of Addition Chain in Applications to Elliptic Curve Cryptosystem
Status: Submitted
by: Mohamed, Mohamad Afendee
Published: (2011) -
Multi-Threading Elliptic Curve Cryptosystems.
by: Kanniah, Uma S., et al.
Published: (2007) -
A review on heuristics for addition chain problem: towards efficient public key cryptosystems
by: Muhammad Noma, Adamu, et al.
Published: (2017) -
A lucas based cryptosystem analog to the ElGamal cryptosystem and elliptic curve cryptosystem
by: Wong, Tze Jin, et al.
Published: (2014) -
A survey on elliptic curve cryptography
by: Mohamed, Mohamad Afendee
Published: (2014)