2011
DOI: 10.1007/978-3-642-23951-9_8
|View full text |Cite
|
Sign up to set email alerts
|

Software Implementation of Binary Elliptic Curves: Impact of the Carry-Less Multiplier on Scalar Multiplication

Abstract: Abstract. The availability of a new carry-less multiplication instruction in the latest Intel desktop processors significantly accelerates multiplication in binary fields and hence presents the opportunity for reevaluating algorithms for binary field arithmetic and scalar multiplication over elliptic curves. We describe how to best employ this instruction in field multiplication and the effect on performance of doubling and halving operations. Alternate strategies for implementing inversion and half-trace are … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
18
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 21 publications
(22 citation statements)
references
References 26 publications
1
18
0
Order By: Relevance
“…Our result is also 12% faster than the recent implementation by Hamburg [13]. Recent implementations on multiple cores are reported by Taverne et al in [29]. However, they do not explore the 128-bit security level in their implementations and, hence, results are not directly comparable.…”
Section: Performance Analysis and Experimental Resultsmentioning
confidence: 52%
“…Our result is also 12% faster than the recent implementation by Hamburg [13]. Recent implementations on multiple cores are reported by Taverne et al in [29]. However, they do not explore the 128-bit security level in their implementations and, hence, results are not directly comparable.…”
Section: Performance Analysis and Experimental Resultsmentioning
confidence: 52%
“…Preliminary results reported here have been published in[42]; this paper is an enhanced and extended version.…”
mentioning
confidence: 79%
“…Note that this time should be divided in steps 5, 6, and 7; and step 9 is also needed to verify the blind signature. All these times have been obtained considering the use of a processor Intel Core i5‐4570S 2.9 GHz (Intel Corporation, Malaysia) .…”
Section: Robust Identity Assignment Protocol For P2p Overlaysmentioning
confidence: 99%