2000
DOI: 10.1007/3-540-44499-8_1
|View full text |Cite
|
Sign up to set email alerts
|

Software Implementation of Elliptic Curve Cryptography over Binary Fields

Abstract: This paper presents an extensive and careful study of the software implementation on workstations of the NIST-recommended elliptic curves over binary fields. We also present the results of our implementation in C on a Pentium II 400 MHz workstation.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
197
0

Year Published

2004
2004
2015
2015

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 270 publications
(197 citation statements)
references
References 29 publications
0
197
0
Order By: Relevance
“…With a polynomial basis, according to [4], S ≈ 1 7.5 M for n = 163 and 1 9 M for n = 233. Following [3] we assume that, on average, I ≈ 8 M when n = 163 and I ≈ 10 M when n = 233.…”
Section: Point Halvingmentioning
confidence: 99%
“…With a polynomial basis, according to [4], S ≈ 1 7.5 M for n = 163 and 1 9 M for n = 233. Following [3] we assume that, on average, I ≈ 8 M when n = 163 and I ≈ 10 M when n = 233.…”
Section: Point Halvingmentioning
confidence: 99%
“…The inverse can be efficiently calculated by the extended Euclidean algorithm for polynomials. In our solution, we use the "modified almost inverse algorithm for inversion in F 2 m " algorithm [6] to calculate the inversion of a polynomial in F 2 163 . An inversion operation takes much longer time than other basic field operations, therefore the group operation algorithm must be carefully selected to reduce the number of inversion operations.…”
Section: Implementation Of Secure Scalar Multiplication In Eccmentioning
confidence: 99%
“…If the sensor nodes are required to verify the signature quickly, the term vP + uQ should be computed efficiently. Inspired by shamir's trick [13], we perform simultaneous elliptic scalar multiplication using wMOF. The details of our algorithm can be found in the Appendix.…”
Section: Implementation Detailsmentioning
confidence: 99%
“…The experimental results testify to the viability of our protocol for WSNs. Furthermore, the proposed protocol outperforms existing ECC-based protocols over GF (2 p ) for WSNs with the aid of efficient algorithms such as width-w Mutual-Opposite-Form (wMOF) [14] and shamir's trick [13].…”
Section: Introductionmentioning
confidence: 99%