Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things

@article{Liu2017EllipticCC,
  title={Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things},
  author={Zhe Liu and Johann Gro{\ss}sch{\"a}dl and Zhi Hu and Kimmo J{\"a}rvinen and Husen Wang and Ingrid Verbauwhede},
  journal={IEEE Transactions on Computers},
  year={2017},
  volume={66},
  pages={773-785}
}
Verification of an ECDSA signature requires a double scalar multiplication on an elliptic curve. In this work, we study the computation of this operation on a twisted Edwards curve with an efficiently computable endomorphism, which allows reducing the number of point doublings by approximately 50 percent compared to a conventional implementation. In particular, we focus on a curve defined over the 207-bit prime field <inline-formula><tex-math notation="LaTeX"> $\mathbb {F}_p$</tex-math… CONTINUE READING

Similar Papers

Citations

Publications citing this paper.
SHOWING 1-10 OF 16 CITATIONS

Analysis and Implementation of ECC Algorithm in Lightweight Device

  • 2019 International Conference on Communication and Signal Processing (ICCSP)
  • 2019
VIEW 1 EXCERPT

References

Publications referenced by this paper.
SHOWING 1-10 OF 37 REFERENCES

The Elliptic Curve Digital Signature Algorithm (ECDSA)

  • International Journal of Information Security
  • 2001
VIEW 11 EXCERPTS
HIGHLY INFLUENTIAL

Twisted Edwards Curves

VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

Twisted Edwards Curves Revisited

  • IACR Cryptology ePrint Archive
  • 2008
VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL