2004
DOI: 10.1007/978-3-540-28632-5_7
|View full text |Cite
|
Sign up to set email alerts
|

Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic

Abstract: Abstract. We introduce new modulus scaling techniques for transforming a class of primes into special forms which enables efficient arithmetic. The scaling technique may be used to improve multiplication and inversion in finite fields. We present an efficient inversion algorithm that utilizes the structure of scaled modulus. Our inversion algorithm exhibits superior performance to the Euclidean algorithm and lends itself to efficient hardware implementation due to its simplicity. Using the scaled modulus techn… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2006
2006
2021
2021

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 46 publications
(21 citation statements)
references
References 11 publications
0
21
0
Order By: Relevance
“…[9] is designed for high frequency applications and cannot be used in smart IC cards. [12] has less gates, but it is still two times of ours and isn't as good as ours in other aspects. Fig.…”
Section: Hardware Modules Implementation and Synthesismentioning
confidence: 66%
“…[9] is designed for high frequency applications and cannot be used in smart IC cards. [12] has less gates, but it is still two times of ours and isn't as good as ours in other aspects. Fig.…”
Section: Hardware Modules Implementation and Synthesismentioning
confidence: 66%
“…A Pseudorandom Number Generators (PRNG) are well-known techniques with broad applications in such areas as cryptography (Tusnoo et al, 2003;Ozturk et al, 2004;Panneton et al, 2006), simulation of stochastic processes (Entacher, 1998), comprehensive testing of technical systems (Leeb and Wegenkittl, 1997;Park and Miller, 1998), medical (Menyaev and Zharov, 2006a;2006b;Menyaev and Zharova, 2006;2013;2016;Sarimollaoglu et al, 2014;Cai et al, 2016a;2016b) and biological research (Wiese et al, 2005;Leonard and Jackson, 2015;Juratly et al, 2015;2016) and others (Rababbah 2004;2007;Politano et al, 2014;2016;Riguzzi, 2016). In these publications, the concept of uniform random numbers in PRNG actively uses the operations of bit logic.…”
Section: Related Workmentioning
confidence: 99%
“…Note that in contrast to most processors reported in literature [4,25,26,31], we include the number for the required storage of the secret scalar k. For an ECC point multiplication, 1,296 bits (81 entries) are necessary (we used a 16 × 84 macro in that case). For higher-level protocols, additional memory is needed (e.g.…”
Section: Memory For Program Data and Constantsmentioning
confidence: 99%