2017
DOI: 10.1049/iet-ifs.2015.0119
|View full text |Cite
|
Sign up to set email alerts
|

Note on scalar multiplication using division polynomials

Abstract: Scalar multiplication is the most important and expensive operation in elliptic curve cryptosystems. In this paper we improve the efficiency of the Elliptic Net algorithm to compute scalar multiplication by using the equivalence of elliptic nets. The proposed method saves f our multiplications in each iteration loop. Experimental results also indicates that our algorithm will be more efficient than the previously known results in this line.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(17 citation statements)
references
References 16 publications
0
17
0
Order By: Relevance
“…The main contribution of this paper is in providing this adaptation and a derivation of this improvement. We also note that Kanayama's algorithm was improved by Chen et al [7]. The adaptation in this paper improves Chen's version of Kanayama's algorithm as well as Kanayama's original ECSM algorithm.…”
Section: Introductionmentioning
confidence: 75%
See 1 more Smart Citation
“…The main contribution of this paper is in providing this adaptation and a derivation of this improvement. We also note that Kanayama's algorithm was improved by Chen et al [7]. The adaptation in this paper improves Chen's version of Kanayama's algorithm as well as Kanayama's original ECSM algorithm.…”
Section: Introductionmentioning
confidence: 75%
“…If we denote the multiplication and squaring in the finite field under consideration by M and S, respectively, it can be seen that the number of operations for both the Double and DoubleAdd steps is 26M + 6S. Chen et al [7] improved Kanayama's algorithm with the new operation count being 18M + 10S. In the next section, we adapt the improvement from [6].…”
Section: Review Of Kanayama's Elliptic Curve Scalar Multiplication Almentioning
confidence: 99%
“…In turn, this paper provides a comprehensive investigation of the mapping phase for several known and widely used elliptic curves. For instance, secp192k1, NIST-224, and secp256k1 are examined [44][45][46]. Finally, this paper proposes effective padding bit values and a method that guarantees successful mapping, as well as efficiency using the least number of bits.…”
Section: Preliminary: Elliptic Curve Cryptography (Ecc)mentioning
confidence: 99%
“…There is a different form of equation 2proposed by Ward [3]. Kanayama [7] and Chen [14] use this equivalent in their scalar multiplication. However, the initial value  (2) N of the sequences was not identical.…”
Section: A Elliptic Divisibility Sequencesmentioning
confidence: 99%
“…The following Table I compares the value of  (2) N for elliptic net scalar multiplication between Kanayama et al [7], Chen [14] and our method.…”
Section: B Comparison Of the Initial Valuesmentioning
confidence: 99%