Efficient Elliptic Curve Exponentiation Using Mixed Coordinates

@inproceedings{Cohen1998EfficientEC,
  title={Efficient Elliptic Curve Exponentiation Using Mixed Coordinates},
  author={H. Cohen and A. Miyaji and Takatoshi Ono},
  booktitle={ASIACRYPT},
  year={1998}
}
  • H. Cohen, A. Miyaji, Takatoshi Ono
  • Published in ASIACRYPT 1998
  • Mathematics, Computer Science
  • Elliptic curve cryptosystems, proposed by Koblitz ([12]) and Miller ([16]), can be constructed over a smaller field of definition than the ElGamal cryptosystems ([6]) or the RSA cryptosystems ([20]). This is why elliptic curve cryptosystems have begun to attract notice. In this paper, we investigate efficient elliptic curve exponentiation. We propose a new coordinate system and a new mixed coordinates strategy, which significantly improves on the number of basic operations needed for elliptic… CONTINUE READING

    Topics from this paper.

    Efficient Algorithms for Pairing-Based Cryptosystems
    • 1,089
    • Open Access
    Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
    • 1,215
    • Open Access
    Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms
    • 324
    • Open Access
    Guide to Elliptic Curve Cryptography
    • 2,577
    • Highly Influenced
    • Open Access
    Securing Elliptic Curve Point Multiplication against Side-Channel Attacks
    • 144
    • Open Access
    Efficient Implementation of Pairing-Based Cryptosystems
    • 160
    • Open Access
    A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks
    • 173
    • Open Access
    Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains
    • 162
    • Open Access
    Hessian Elliptic Curves and Side-Channel Attacks
    • 216
    • Open Access

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 40 REFERENCES
    Elliptic curve cryptosystems
    • 4,785
    • Open Access
    Efficient elliptic curve exponentiation
    • 127
    • Open Access
    Use of Elliptic Curves in Cryptography
    • 3,272
    • Open Access
    Reducing elliptic curve logarithms to logarithms in a finite field
    • 944
    • Open Access
    CM-Curves with Good Cryptographic Properties
    • 425
    • Open Access
    Fast Key Exchange with Elliptic Curve Systems
    • 276
    • Open Access