Signed decomposition method for scalar multiplication in elliptic curve cryptography
Addition chain is the solution to computability constraint of the problematic large number arithmetic. In elliptic curve cryptography, a point arithmetic on elliptic curve can be reduced to repetitive addition and doubling operations. Based on this idea, various methods were proposed, lately a decom...
| Main Authors: | Md. Said, Mohamad Rushdan, Mohamed, M. A., Mohd Atan, Kamel Ariffin, Ahmad Zukarnain, Zuriati |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
American Institute of Physics
2010
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/57287/ http://psasir.upm.edu.my/id/eprint/57287/1/Signed%20decomposition%20method%20for%20scalar%20multiplication%20in%20elliptic%20curve%20cryptography.pdf |
Similar Items
An improved binary method for scalar multiplication in elliptic curve cryptography
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
Scalar multiplication via elliptic nets with application to cryptography
by: Muslim, Norliana, et al.
Published: (2018)
by: Muslim, Norliana, et al.
Published: (2018)
High performance methods of elliptic curve scalar multiplication
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2014)
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2014)
Integer Sub-Decomposition (Isd)
Method For Elliptic Curve
Scalar Multiplication
by: Ajeena, Ruma Kareem K.
Published: (2015)
by: Ajeena, Ruma Kareem K.
Published: (2015)
An algorithm to enhance elliptic curves scalar multiplication combining MBNR with point halving
by: M. Ismail, Abdulwahed, et al.
Published: (2010)
by: M. Ismail, Abdulwahed, et al.
Published: (2010)
Elliptic net scalar multiplication upon Koblitz curves
by: Muslim, Norliana, et al.
Published: (2020)
by: Muslim, Norliana, et al.
Published: (2020)
Key exchange in elliptic curve cryptography based on the decomposition problem
by: Hilyati Hanina Zazali,, et al.
Published: (2012)
by: Hilyati Hanina Zazali,, et al.
Published: (2012)
Pseudo T - adic non adjacent form for scalar multiplication on Koblitz Curves
by: Yunos, Faridah, et al.
Published: (2015)
by: Yunos, Faridah, et al.
Published: (2015)
A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate
by: Abdulraheem, Waleed Khalid Amin
Published: (2019)
by: Abdulraheem, Waleed Khalid Amin
Published: (2019)
Generalizing equivalent elliptic divisibility sequence for elliptic net scalar multiplication
by: Muslim, Norliana, et al.
Published: (2018)
by: Muslim, Norliana, et al.
Published: (2018)
Pseudo τ - adic non adjacent form for scalar multiplication on Koblitz curves
by: Yunos, Faridah, et al.
Published: (2015)
by: Yunos, Faridah, et al.
Published: (2015)
Pseudo τ-adic non adjacent form for scalar multiplication on Koblitz Curves
by: Yunos, Faridah, et al.
Published: (2015)
by: Yunos, Faridah, et al.
Published: (2015)
Pseudo τ - adic non adjacent form for scalar multiplication on Koblitz curves
by: Yunos, Faridah, et al.
Published: (2014)
by: Yunos, Faridah, et al.
Published: (2014)
Speeding up the elliptic curve scalar multiplication using the window- w non adjacent form
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2015)
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2015)
A survey on elliptic curve cryptography
by: Mohamed, Mohamad Afendee
Published: (2014)
by: Mohamed, Mohamad Afendee
Published: (2014)
Elliptic net scalar multiplication using generalized equivalent elliptic divisibility sequence
by: Muslim, Norliana, et al.
Published: (2018)
by: Muslim, Norliana, et al.
Published: (2018)
The Construction Of Efficiently
Computable Endomorphisms For
Scalar Multiplication On Some
Elliptic Curves
by: Antony, Siti Noor Farwina Mohamad Anwar
Published: (2019)
by: Antony, Siti Noor Farwina Mohamad Anwar
Published: (2019)
Improving the performance of {0,1,3}-NAF recoding algorithm for elliptic curve scalar multiplication
by: Abdul Raheem, Waleed K., et al.
Published: (2019)
by: Abdul Raheem, Waleed K., et al.
Published: (2019)
New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field
by: Md Yasin, Sharifah
Published: (2011)
by: Md Yasin, Sharifah
Published: (2011)
A reduced τ-adic Naf (RTNAF) representation for an efficient scalar multiplication on Anomalous Binary Curves (ABC)
by: Yunos, Faridah, et al.
Published: (2014)
by: Yunos, Faridah, et al.
Published: (2014)
Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields
by: Al-Saffar, Najlae Falah Hameed
Published: (2015)
by: Al-Saffar, Najlae Falah Hameed
Published: (2015)
A new cryptographic algorithm based on decomposition problem in elliptic curve cryptography / Hilyati Hanina Zazali
by: Hilyati Hanina, Zazali
Published: (2012)
by: Hilyati Hanina, Zazali
Published: (2012)
New Representation Method For Integers And Its Application On Elliptic Curve Cryptography
by: Eghdamian, Arash
Published: (2020)
by: Eghdamian, Arash
Published: (2020)
An improved public key cryptography based on the elliptic curve
by: Al-Daoud, Essam Faleh
Published: (2002)
by: Al-Daoud, Essam Faleh
Published: (2002)
Encrypting text data using elliptic curve cryptography
by: Ali, Abas Abdullahi
Published: (2018)
by: Ali, Abas Abdullahi
Published: (2018)
Improvement to scalar multiplication on Koblitz curves by using pseudo τ-adic non-adjacent form
by: Yunos, Faridah, et al.
Published: (2015)
by: Yunos, Faridah, et al.
Published: (2015)
Robust and secure image steganography based on elliptic curve cryptography
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
On the design of projective binary Edwards elliptic curves over GF (p) benefitting from mapping elliptic curves computation to variable degree of parallel design
by: Al-Khatib, Mohammad Hussein Fayiz, et al.
Published: (2011)
by: Al-Khatib, Mohammad Hussein Fayiz, et al.
Published: (2011)
Elliptical curve cryptography-kerberos authentication model for keystone in open stack
by: Shamugam, V., et al.
Published: (2017)
by: Shamugam, V., et al.
Published: (2017)
Quantum-Elliptic curve Cryptography for Multihop Communication in 5G Networks
by: Khan, A.S., et al.
Published: (2017)
by: Khan, A.S., et al.
Published: (2017)
A hybrid addition chain method for faster scalar multiplication
by: Mohamed, Mohamad Afendee, et al.
Published: (2015)
by: Mohamed, Mohamad Afendee, et al.
Published: (2015)
Parallelizing GF (p) montgomery elliptic curve crypto-system operations to improve security and performance.
by: Mohammad Alkhatib,, et al.
Published: (2012)
by: Mohammad Alkhatib,, et al.
Published: (2012)
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
New quintupling point arithmetic 5P formulas for Lŏpez-Dahab coordinate over binary elliptic curve cryptography
by: Abdul Raheem, Waleed Khalid Amin, et al.
Published: (2019)
by: Abdul Raheem, Waleed Khalid Amin, et al.
Published: (2019)
Shorter addition chain for smooth integers using decomposition method.
by: Mohamed, M. A., et al.
Published: (2011)
by: Mohamed, M. A., et al.
Published: (2011)
Iterative sliding window method for shorter number of operations in modular exponentiation and scalar multiplication
by: Noma, Adamu Muhammad, et al.
Published: (2017)
by: Noma, Adamu Muhammad, et al.
Published: (2017)
Improved scalar multiplication algorithm in affine coordinate system using elliptic net
by: Razali, Zuren, et al.
Published: (2022)
by: Razali, Zuren, et al.
Published: (2022)
On some patterns of TNAF for scalar multiplication over Koblitz curve
by: Yunos, Faridah, et al.
Published: (2022)
by: Yunos, Faridah, et al.
Published: (2022)
Enhanced scalar multiplication algorithm over prime field using elliptic net
by: Muslim, Norliana, et al.
Published: (2024)
by: Muslim, Norliana, et al.
Published: (2024)
Improved arithmetic on elliptic curves over prime field
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2014)
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2014)
Similar Items
-
An improved binary method for scalar multiplication in elliptic curve cryptography
by: Mohamed, Mohamad Afendee, et al.
Published: (2010) -
Scalar multiplication via elliptic nets with application to cryptography
by: Muslim, Norliana, et al.
Published: (2018) -
High performance methods of elliptic curve scalar multiplication
by: Al Saffar, Najlae Falah Hameed, et al.
Published: (2014) -
Integer Sub-Decomposition (Isd)
Method For Elliptic Curve
Scalar Multiplication
by: Ajeena, Ruma Kareem K.
Published: (2015) -
An algorithm to enhance elliptic curves scalar multiplication combining MBNR with point halving
by: M. Ismail, Abdulwahed, et al.
Published: (2010)