Parallelizing GF (p) montgomery elliptic curve crypto-system operations to improve security and performance.
The elliptic curve crypto-system (ECC) performs two levels of computations, lower point operations, and upper scalar multiplication levels. The use of usual serial design and affine coordinates to apply ECC computations increases the time delay and weaken the security of the crypto-system against si...
| Main Authors: | Alkhatib, Mohammad, Jaafar, Azmi, Md Said, Mohamad Rushdan, Ahmad Zulkarnain, Zuriati |
|---|---|
| Other Authors: | Sivakumar, R. |
| Format: | Book Section |
| Published: |
Trans Tech Publications
2013
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/29990/ |
Similar Items
Parallelizing GF (p) montgomery elliptic curve crypto-system operations to improve security and performance.
by: Mohammad Alkhatib,, et al.
Published: (2012)
by: Mohammad Alkhatib,, et al.
Published: (2012)
Trade-off between area and speed for projective Edwards Elliptic Curves Crypto-system over GF (p) using parallel hardware designs and architectures
by: Al-Khatib, Mohammad Hussein Fayiz, et al.
Published: (2011)
by: Al-Khatib, Mohammad Hussein Fayiz, et al.
Published: (2011)
On the design of projective binary Edwards elliptic curves over GF (p) benefitting from mapping elliptic curves computation to variable degree of parallel design
by: Al-Khatib, Mohammad Hussein Fayiz, et al.
Published: (2011)
by: Al-Khatib, Mohammad Hussein Fayiz, et al.
Published: (2011)
Choices on designing GF (p) elliptic curve coprocessor benefiting from mapping homogeneous curves in parallel multiplications
by: Al-Haija, Qasem Abu, et al.
Published: (2011)
by: Al-Haija, Qasem Abu, et al.
Published: (2011)
Design and performance evaluation of parallel elliptic curve cryptosystem with GF(P) projective coordinates
by: Hussein Fayiz, Mohammad Al-Khatib
Published: (2012)
by: Hussein Fayiz, Mohammad Al-Khatib
Published: (2012)
A new addition formula for elliptic curves over GF(2/sup n/)
by: Al-Daoud, E., et al.
Published: (2002)
by: Al-Daoud, E., et al.
Published: (2002)
Improving security performance with parallel crypto operations in SSL bulk data transfer
by: Alaidaros, Hashem Mohammed, et al.
Published: (2009)
by: Alaidaros, Hashem Mohammed, et al.
Published: (2009)
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
by: Alaidaros, Hashem Mohammed, et al.
Published: (2007)
by: Alaidaros, Hashem Mohammed, et al.
Published: (2007)
Hardware architectures & designs for projective elliptic curves point addition operation using variable levels of parallelism
by: Al-Khatib, Mohammad Hussein Fayiz, et al.
Published: (2011)
by: Al-Khatib, Mohammad Hussein Fayiz, et al.
Published: (2011)
An improved binary method for scalar multiplication in elliptic curve cryptography
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
Signed decomposition method for scalar multiplication in elliptic curve cryptography
by: Md. Said, Mohamad Rushdan, et al.
Published: (2010)
by: Md. Said, Mohamad Rushdan, et al.
Published: (2010)
High performance methods of elliptic curve scalar multiplication
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2014)
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2014)
Improved arithmetic on elliptic curves over prime field
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2014)
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2014)
Elliptic net scalar multiplication upon Koblitz curves
by: Muslim, Norliana, et al.
Published: (2020)
by: Muslim, Norliana, et al.
Published: (2020)
Robust and secure image steganography based on elliptic curve cryptography
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
On the mathematical complexity and the time implementation
of proposed variants of elliptic curves cryptosystems
by: Al-Saffar, Najlae F. Hameed, et al.
Published: (2013)
by: Al-Saffar, Najlae F. Hameed, et al.
Published: (2013)
Securing the image through the combination of elliptic curve cryptosystem and hill cipher encryption
by: Sulaiman, Saniah
Published: (2019)
by: Sulaiman, Saniah
Published: (2019)
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
An algorithm to enhance elliptic curves scalar multiplication combining MBNR with point halving
by: M. Ismail, Abdulwahed, et al.
Published: (2010)
by: M. Ismail, Abdulwahed, et al.
Published: (2010)
Speeding up the elliptic curve scalar multiplication using the window- w non adjacent form
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2015)
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2015)
A lucas based cryptosystem analog to the ElGamal cryptosystem and elliptic curve cryptosystem
by: Wong, Tze Jin, et al.
Published: (2014)
by: Wong, Tze Jin, et al.
Published: (2014)
Numerical modular symbols for elliptic curves
by: Wuthrich, Christian
Published: (2017)
by: Wuthrich, Christian
Published: (2017)
Anabelian geometry of punctured elliptic curves
by: Porowski, Wojciech
Published: (2020)
by: Porowski, Wojciech
Published: (2020)
A survey on elliptic curve cryptography
by: Mohamed, Mohamad Afendee
Published: (2014)
by: Mohamed, Mohamad Afendee
Published: (2014)
Multi-Threading Elliptic Curve Cryptosystems.
by: Kanniah, Uma S., et al.
Published: (2007)
by: Kanniah, Uma S., et al.
Published: (2007)
Crypto-to-Crypto Transactions: A Modern Quandary in Realisation Taxation
by: Allen, Christina, et al.
Published: (2025)
by: Allen, Christina, et al.
Published: (2025)
Error Detecting Dual Basis Bit Parallel Systolic Multiplication Architecture over GF(2m)
by: Singh, Ashutosh Kumar, et al.
Published: (2009)
by: Singh, Ashutosh Kumar, et al.
Published: (2009)
Error Detecting Dual Basis Bit Parallel Systolic Multiplication Architecture over GF(2m)
by: Singh, Ashutosh Kumar, et al.
Published: (2009)
by: Singh, Ashutosh Kumar, et al.
Published: (2009)
Security analysis of Lucas based El-Gamal Cryptosystem in the elliptic curve group over finite field using two types of GMITM attacks
by: Sarbini, Izzatul Nabila, et al.
Published: (2018)
by: Sarbini, Izzatul Nabila, et al.
Published: (2018)
High performance of RSA simulation system based on modified montgomery algorithm
by: Liu, J., et al.
Published: (2016)
by: Liu, J., et al.
Published: (2016)
Kolyvagin Derivatives of Modular Points on Elliptic Curves
by: Hatton, Richard
Published: (2020)
by: Hatton, Richard
Published: (2020)
Committal deniable signatures over elliptic curves
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
Generalizing equivalent elliptic divisibility sequence for elliptic net scalar multiplication
by: Muslim, Norliana, et al.
Published: (2018)
by: Muslim, Norliana, et al.
Published: (2018)
Graduation Form 7GF (Coursework)
by: Universiti Malaysia Sarawak, Centre for Graduate Studies
Published: (2016)
by: Universiti Malaysia Sarawak, Centre for Graduate Studies
Published: (2016)
Graduation Form 7GF(By Research)
by: Universiti Malaysia Sarawak, Centre for Graduate Studies
Published: (2016)
by: Universiti Malaysia Sarawak, Centre for Graduate Studies
Published: (2016)
Elliptic net scalar multiplication using generalized equivalent elliptic divisibility sequence
by: Muslim, Norliana, et al.
Published: (2018)
by: Muslim, Norliana, et al.
Published: (2018)
Vanishing of some Galois cohomology groups for elliptic curves
by: Lawson, Tyler, et al.
Published: (2016)
by: Lawson, Tyler, et al.
Published: (2016)
A new encryption algorithm over elliptic curve
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
An improved public key cryptography based on the elliptic curve
by: Al-Daoud, Essam Faleh
Published: (2002)
by: Al-Daoud, Essam Faleh
Published: (2002)
Encrypting text data using elliptic curve cryptography
by: Ali, Abas Abdullahi
Published: (2018)
by: Ali, Abas Abdullahi
Published: (2018)
Similar Items
-
Parallelizing GF (p) montgomery elliptic curve crypto-system operations to improve security and performance.
by: Mohammad Alkhatib,, et al.
Published: (2012) -
Trade-off between area and speed for projective Edwards Elliptic Curves Crypto-system over GF (p) using parallel hardware designs and architectures
by: Al-Khatib, Mohammad Hussein Fayiz, et al.
Published: (2011) -
On the design of projective binary Edwards elliptic curves over GF (p) benefitting from mapping elliptic curves computation to variable degree of parallel design
by: Al-Khatib, Mohammad Hussein Fayiz, et al.
Published: (2011) -
Choices on designing GF (p) elliptic curve coprocessor benefiting from mapping homogeneous curves in parallel multiplications
by: Al-Haija, Qasem Abu, et al.
Published: (2011) -
Design and performance evaluation of parallel elliptic curve cryptosystem with GF(P) projective coordinates
by: Hussein Fayiz, Mohammad Al-Khatib
Published: (2012)