2015
DOI: 10.1109/tvlsi.2014.2321282
|View full text |Cite
|
Sign up to set email alerts
|

Accelerating Scalar Conversion for Koblitz Curve Cryptoprocessors on Hardware Platforms

Abstract: Abstract-Koblitz curves are a class of computationally efficient elliptic curves where scalar multiplications can be accelerated using τ NAF representations of scalars. However conversion from an integer scalar to a short τ NAF is a costly operation. In this paper we improve the recently proposed scalar conversion scheme based on division by τ 2 . We apply two levels of optimizations in the scalar conversion architecture. First we reduce the number of long integer subtractions during the scalar conversion. Thi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 26 publications
0
1
0
Order By: Relevance
“…Integer encoding methods for signed-digit representation, which remove a stream of non-zero bits, include Booth encoding [1], a Fibonacci encoding [2] and Non-Adjacent Form (NAF). Compared to the other encoding methods, NAF has been used in diverse applications such as public key cryptography [3][4][5][6], packet filtering [7][8], constructing a ternary FCSRs [9][10] and analysis for medical predictive models [11]. In particular, NAF has been actively used in some exponentiation-based public-key cryptographic algorithms including RSA [12] and Elliptic Curve Cryptography (ECC) [13][14].…”
Section: Introductionmentioning
confidence: 99%
“…Integer encoding methods for signed-digit representation, which remove a stream of non-zero bits, include Booth encoding [1], a Fibonacci encoding [2] and Non-Adjacent Form (NAF). Compared to the other encoding methods, NAF has been used in diverse applications such as public key cryptography [3][4][5][6], packet filtering [7][8], constructing a ternary FCSRs [9][10] and analysis for medical predictive models [11]. In particular, NAF has been actively used in some exponentiation-based public-key cryptographic algorithms including RSA [12] and Elliptic Curve Cryptography (ECC) [13][14].…”
Section: Introductionmentioning
confidence: 99%