2010 Ninth International Conference on Grid and Cloud Computing 2010
DOI: 10.1109/gcc.2010.42
|View full text |Cite
|
Sign up to set email alerts
|

Parallel Algorithms for Cryptosystem on Conic Curves over Finite Field Fp

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 8 publications
0
9
0
Order By: Relevance
“…As depicted in [17,18], time complexities of basic operations are listed in table 1. And we set the runtime of single-precision multiplication as the basic measurement unit.…”
Section: Time Complexities Of Basic Operationsmentioning
confidence: 99%
See 1 more Smart Citation
“…As depicted in [17,18], time complexities of basic operations are listed in table 1. And we set the runtime of single-precision multiplication as the basic measurement unit.…”
Section: Time Complexities Of Basic Operationsmentioning
confidence: 99%
“…An important property of lucas function to increase the performance of LUC cryptosystem computation is introduced in [16]. Our previous works in [17,18] present basic parallel algorithms for cryptosystem on conic curves over finite field Fp and ring Zn. Nevertheless, there is no existing research about parallel point-multiplication for conic curves cryptosystem.…”
Section: Introductionmentioning
confidence: 99%
“…A parallel algorithm for computation of inverses of matrices modulo n is introduced in [15]. Our previous works in [16] present several parallel algorithms for cryptosystem on conic curves over finite field Fp. Nevertheless, there is no existing research about the parallel algorithms of point-addition and point-double in conic curves cryptosystem over ring Zn.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, it is important to design highspeed parallel algorithms for both encryption and decryption. We have done some works regarding the parallel algorithms for conic curves cryptosystem over finite field Fp and ring Zn [6][7][8][9][10][11]. Finite field GF (2 n ) is one of the common used mathematical sets for constructing cryptosystems including elliptic curves cryptography [12,13] and conic curves cryptography.…”
Section: Introductionmentioning
confidence: 99%