2009
DOI: 10.1109/tc.2009.61
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing the Galbraith-Lin-Scott Point Multiplication Method for Elliptic Curves over Binary Fields

Abstract: Abstract. Galbraith, Lin and Scott recently constructed efficiently-computable endomorphisms for a large family of elliptic curves defined over Fq 2 and showed, in the case where q is prime, that the Gallant-Lambert-Vanstone point multiplication method for these curves is significantly faster than point multiplication for general elliptic curves over prime fields. In this paper, we investigate the potential benefits of using Galbraith-Lin-Scott elliptic curves in the case where q is a power of 2. The analysis … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 44 publications
(26 citation statements)
references
References 30 publications
0
26
0
Order By: Relevance
“…Later, in [16] Galbraith et al showed how to exploit the Frobenius endomorphism to enable the use of the GLV approach on a wider set of curves defined over the quadratic extension field F p 2 . Since then, significant research has been performed to improve the performance [30,24] and to explore the applicability to other settings [20,35] or to higher dimensions on genus one curves [24,31,18] and genus two curves [8,9,18]. Unfortunately, most of the work and comparisons with other approaches have been carried out with unprotected algorithms and implementations.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Later, in [16] Galbraith et al showed how to exploit the Frobenius endomorphism to enable the use of the GLV approach on a wider set of curves defined over the quadratic extension field F p 2 . Since then, significant research has been performed to improve the performance [30,24] and to explore the applicability to other settings [20,35] or to higher dimensions on genus one curves [24,31,18] and genus two curves [8,9,18]. Unfortunately, most of the work and comparisons with other approaches have been carried out with unprotected algorithms and implementations.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, it does not require dummy operations, making it resilient to safe-error attacks [42,43], and can be used as basis for realizing constanttime implementations that guard against timing attacks [26,11,2,36]. In addition, we present different variants of the technique that are intended for different scenarios exploiting simple or complex GLV decompositions, and thus provide algorithms that have broad applicability to many settings using GLV, GLS, or a combination of both [16,20,30,24,31,35,8,9,18,39]. In comparison with the best previous approaches, the method improves the computing performance especially during the potentially expensive precomputation stage, and allows us to save at least half of the storage requirement for precomputed values without impacting performance.…”
Section: Introductionmentioning
confidence: 99%
“…In a quadratic extension, the equation λ 2 + λ = c + Tr(c) can be solved for c = c 0 + c 1 u ∈ F 2 2 m by computing two half-traces in F 2 m , as described in [20]. First, solve λ 2 1 + λ 1 = c 1 to obtain λ 1 , and then solve …”
Section: Implementation Aspectsmentioning
confidence: 99%
“…There is an efficient point halving algorithm for binary fields [1,5,8,9,10] that is used to perform efficient scalar multiplication for elliptic curves over binary fields. However, there is no known point halving algorithm for elliptic curves defined over prime fields [11].…”
Section: Binary Division Algorithmmentioning
confidence: 99%