2014
DOI: 10.1007/978-3-319-04852-9_1
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and Secure Algorithms for GLV-Based Scalar Multiplication and Their Implementation on GLV-GLS Curves

Abstract: We propose efficient algorithms and formulas that improve the performance of side channel protected elliptic curve computations with special focus on scalar multiplication exploiting the Gallant-Lambert-Vanstone (CRYPTO 2001) and Galbraith-Lin-Scott (EUROCRYPT 2009) methods. Firstly, by adapting Feng et al.'s recoding to the GLV setting, we derive new regular algorithms for variable-base scalar multiplication that offer protection against simple side-channel and timing attacks. Secondly, we propose an efficien… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
40
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 47 publications
(41 citation statements)
references
References 37 publications
(120 reference statements)
1
40
0
Order By: Relevance
“…Our speeds also solidly beat all available ECC software, including [8], [11], and [17]; solidly beat the Sandy Bridge/Ivy Bridge ECC speeds claimed in [28], [32], and [35]; and are even faster than the previous Sandy Bridge/Ivy Bridge DH record claimed in [19], namely 96000/92000 cycles using unpublished software for GLV+GLS ECC. The only high-security DH speed faster than ours in the literature is the 60000 Haswell cycles claimed in [35] for a GLS curve over a binary field.…”
Section: Introductionsupporting
confidence: 73%
See 1 more Smart Citation
“…Our speeds also solidly beat all available ECC software, including [8], [11], and [17]; solidly beat the Sandy Bridge/Ivy Bridge ECC speeds claimed in [28], [32], and [35]; and are even faster than the previous Sandy Bridge/Ivy Bridge DH record claimed in [19], namely 96000/92000 cycles using unpublished software for GLV+GLS ECC. The only high-security DH speed faster than ours in the literature is the 60000 Haswell cycles claimed in [35] for a GLS curve over a binary field.…”
Section: Introductionsupporting
confidence: 73%
“…For comparison, the public has no easy way to check the "constant time" claims for the software in [19], so for users the only safe assumption is that the claims are not correct. If that software is deployed somewhere then an attacker can be expected to do the necessary reverse-engineering work to discover and exploit the timing variability.…”
Section: Introductionmentioning
confidence: 99%
“…More specifically, there are scalar recoding algorithms (cf. [24,16]) that seemingly make it possible to implement the Jac1271 or GLV128c routines such that scalar multiplications on random inputs will run in constant time with probability exponentially close to 1. However, in order to guard against active adversaries and to be considered truly constant-time, the routines should be guaranteed to execute identically and run correctly for all combinations of integer scalars and input points; this means the explicit formulas must be able to handle input combinations in J C that are not "general" in the sense of Assumption 1.…”
Section: Methodsmentioning
confidence: 99%
“…The authors of [6,12,35] propose ways to speed up cryptography using the NEON vector instructions. Intel's SSE2 vector instruction set extension is used to compute pairings in [15] and multiply big numbers in [21].…”
Section: Related Workmentioning
confidence: 99%