Choices on designing GF (p) elliptic curve coprocessor benefiting from mapping homogeneous curves in parallel multiplications
Modular inversion operation is known to be the most time consuming operation in ECC field arithmetic computations. In addition, Many ECC designs that use projective coordinates over GF (p) have not considered different factors that affect the design of ECC such as area, hardware utilization, cost (A...
| Main Authors: | Al-Haija, Qasem Abu, Al-Khatib, Mohammad Hussein Fayiz, Jaafar, Azmi |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Engg Journals Publications
2011
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/22500/ http://psasir.upm.edu.my/id/eprint/22500/1/IJCSE11-03-02-056.pdf |
Similar Items
Design and performance evaluation of parallel elliptic curve cryptosystem with GF(P) projective coordinates
by: Hussein Fayiz, Mohammad Al-Khatib
Published: (2012)
by: Hussein Fayiz, Mohammad Al-Khatib
Published: (2012)
On the design of projective binary Edwards elliptic curves over GF (p) benefitting from mapping elliptic curves computation to variable degree of parallel design
by: Al-Khatib, Mohammad Hussein Fayiz, et al.
Published: (2011)
by: Al-Khatib, Mohammad Hussein Fayiz, et al.
Published: (2011)
Hardware architectures & designs for projective elliptic curves point addition operation using variable levels of parallelism
by: Al-Khatib, Mohammad Hussein Fayiz, et al.
Published: (2011)
by: Al-Khatib, Mohammad Hussein Fayiz, et al.
Published: (2011)
Trade-off between area and speed for projective Edwards Elliptic Curves Crypto-system over GF (p) using parallel hardware designs and architectures
by: Al-Khatib, Mohammad Hussein Fayiz, et al.
Published: (2011)
by: Al-Khatib, Mohammad Hussein Fayiz, et al.
Published: (2011)
Parallelizing GF (p) montgomery elliptic curve crypto-system operations to improve security and performance.
by: Mohammad Alkhatib,, et al.
Published: (2012)
by: Mohammad Alkhatib,, et al.
Published: (2012)
Parallelizing GF (p) montgomery elliptic curve crypto-system operations to improve security and performance.
by: Alkhatib, Mohammad, et al.
Published: (2013)
by: Alkhatib, Mohammad, et al.
Published: (2013)
A new addition formula for elliptic curves over GF(2/sup n/)
by: Al-Daoud, E., et al.
Published: (2002)
by: Al-Daoud, E., et al.
Published: (2002)
High performance methods of elliptic curve scalar multiplication
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2014)
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2014)
Elliptic net scalar multiplication upon Koblitz curves
by: Muslim, Norliana, et al.
Published: (2020)
by: Muslim, Norliana, et al.
Published: (2020)
An improved binary method for scalar multiplication in elliptic curve cryptography
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
Signed decomposition method for scalar multiplication in elliptic curve cryptography
by: Md. Said, Mohamad Rushdan, et al.
Published: (2010)
by: Md. Said, Mohamad Rushdan, et al.
Published: (2010)
Integer Sub-Decomposition (Isd)
Method For Elliptic Curve
Scalar Multiplication
by: Ajeena, Ruma Kareem K.
Published: (2015)
by: Ajeena, Ruma Kareem K.
Published: (2015)
The Construction Of Efficiently
Computable Endomorphisms For
Scalar Multiplication On Some
Elliptic Curves
by: Antony, Siti Noor Farwina Mohamad Anwar
Published: (2019)
by: Antony, Siti Noor Farwina Mohamad Anwar
Published: (2019)
An improved public key cryptography based on the elliptic curve
by: Al-Daoud, Essam Faleh
Published: (2002)
by: Al-Daoud, Essam Faleh
Published: (2002)
Numerical modular symbols for elliptic curves
by: Wuthrich, Christian
Published: (2017)
by: Wuthrich, Christian
Published: (2017)
Anabelian geometry of punctured elliptic curves
by: Porowski, Wojciech
Published: (2020)
by: Porowski, Wojciech
Published: (2020)
A survey on elliptic curve cryptography
by: Mohamed, Mohamad Afendee
Published: (2014)
by: Mohamed, Mohamad Afendee
Published: (2014)
Multi-Threading Elliptic Curve Cryptosystems.
by: Kanniah, Uma S., et al.
Published: (2007)
by: Kanniah, Uma S., et al.
Published: (2007)
Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields
by: Al-Saffar, Najlae Falah Hameed
Published: (2015)
by: Al-Saffar, Najlae Falah Hameed
Published: (2015)
Improved arithmetic on elliptic curves over prime field
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2014)
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2014)
Improved algorithms of elliptic curve point multiplication over binary and prime fields using elliptic net
by: Muslim, Norliana
Published: (2022)
by: Muslim, Norliana
Published: (2022)
Speeding up the elliptic curve scalar multiplication using the window- w non adjacent form
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2015)
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2015)
An algorithm to enhance elliptic curves scalar multiplication combining MBNR with point halving
by: M. Ismail, Abdulwahed, et al.
Published: (2010)
by: M. Ismail, Abdulwahed, et al.
Published: (2010)
Kolyvagin Derivatives of Modular Points on Elliptic Curves
by: Hatton, Richard
Published: (2020)
by: Hatton, Richard
Published: (2020)
Committal deniable signatures over elliptic curves
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
Vanishing of some Galois cohomology groups for elliptic curves
by: Lawson, Tyler, et al.
Published: (2016)
by: Lawson, Tyler, et al.
Published: (2016)
A new encryption algorithm over elliptic curve
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Encrypting text data using elliptic curve cryptography
by: Ali, Abas Abdullahi
Published: (2018)
by: Ali, Abas Abdullahi
Published: (2018)
Addition chain heuristics in application to elliptic curve cryptosystems
by: Mohamed, Mohamad Afendee, et al.
Published: (2024)
by: Mohamed, Mohamad Afendee, et al.
Published: (2024)
On the mathematical complexity and the time implementation
of proposed variants of elliptic curves cryptosystems
by: Al-Saffar, Najlae F. Hameed, et al.
Published: (2013)
by: Al-Saffar, Najlae F. Hameed, et al.
Published: (2013)
Improving the performance of {0,1,3}-NAF recoding algorithm for elliptic curve scalar multiplication
by: Abdul Raheem, Waleed K., et al.
Published: (2019)
by: Abdul Raheem, Waleed K., et al.
Published: (2019)
Robust and secure image steganography based on elliptic curve cryptography
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
Modular forms and elliptic curves over imaginary
quadratic fields
by: Lingham, Mark Peter
Published: (2005)
by: Lingham, Mark Peter
Published: (2005)
K1-congruences between L-values of elliptic curves
by: Ward, Thomas
Published: (2009)
by: Ward, Thomas
Published: (2009)
Key exchange in elliptic curve cryptography based on the decomposition problem
by: Hilyati Hanina Zazali,, et al.
Published: (2012)
by: Hilyati Hanina Zazali,, et al.
Published: (2012)
Saturation of Mordell-Weil Groups of Elliptic Curves over Number Fields
by: Prickett, Martin
Published: (2004)
by: Prickett, Martin
Published: (2004)
Elliptical curve cryptography-kerberos authentication model for keystone in open stack
by: Shamugam, V., et al.
Published: (2017)
by: Shamugam, V., et al.
Published: (2017)
A new elliptic curve cryptographic system over the finite fields
by: Priyatharsan, U., et al.
Published: (2017)
by: Priyatharsan, U., et al.
Published: (2017)
An efficient identity-based group signature scheme over elliptic curves
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
Quantum-Elliptic curve Cryptography for Multihop Communication in 5G Networks
by: Khan, A.S., et al.
Published: (2017)
by: Khan, A.S., et al.
Published: (2017)
Similar Items
-
Design and performance evaluation of parallel elliptic curve cryptosystem with GF(P) projective coordinates
by: Hussein Fayiz, Mohammad Al-Khatib
Published: (2012) -
On the design of projective binary Edwards elliptic curves over GF (p) benefitting from mapping elliptic curves computation to variable degree of parallel design
by: Al-Khatib, Mohammad Hussein Fayiz, et al.
Published: (2011) -
Hardware architectures & designs for projective elliptic curves point addition operation using variable levels of parallelism
by: Al-Khatib, Mohammad Hussein Fayiz, et al.
Published: (2011) -
Trade-off between area and speed for projective Edwards Elliptic Curves Crypto-system over GF (p) using parallel hardware designs and architectures
by: Al-Khatib, Mohammad Hussein Fayiz, et al.
Published: (2011) -
Parallelizing GF (p) montgomery elliptic curve crypto-system operations to improve security and performance.
by: Mohammad Alkhatib,, et al.
Published: (2012)