Software Implementation of the NIST Elliptic Curves Over Prime Fields

@inproceedings{Brown2001SoftwareIO,
  title={Software Implementation of the NIST Elliptic Curves Over Prime Fields},
  author={Michael Brown and Darrel Hankerson and Julio L{\'o}pez Hernandez and Alfred Menezes},
  booktitle={CT-RSA},
  year={2001}
}
This paper presents an extensive study of the software implementation on workstations of the NIST-recommended elliptic curves over prime fields. We present the results of our implementation in C and assembler on a Pentium II 400MHz workstation. We also provide a comparison with the NIST-recommended curves over binary fields. 

Tables and Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 194 CITATIONS

The design space of ultra-low energy asymmetric cryptography

  • 2014 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS)
  • 2014
VIEW 6 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

NEW TYPE OF OPTIMAL EXTENSION FIELDS AND ITS APPLICATIONS

VIEW 9 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Efficient and Secure ECDSA Algorithm and its Applications: A Survey

VIEW 7 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Speed Optimizations in Bitcoin Key Recovery Attacks

  • IACR Cryptology ePrint Archive
  • 2016
VIEW 6 EXCERPTS
HIGHLY INFLUENCED

Implementations of Elliptic Curve Cryptography

VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Speeding up subgroup cryptosystems

VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2001
2019

CITATION STATISTICS

  • 27 Highly Influenced Citations

  • Averaged 6 Citations per year from 2017 through 2019

References

Publications referenced by this paper.
SHOWING 1-10 OF 29 REFERENCES

Efficient Arithmetic on Koblitz Curves

  • Des. Codes Cryptogr.
  • 2000
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

and A

D. Hankerson, J. Hernande
  • Menezes, “Software implementation of elliptic curve cryptography over binary fields”, Cryptographic Hardware and Embedded Systems–CHES
  • 2000
VIEW 1 EXCERPT

Comparison of three modular reduction functions ”

R. Govaerts A. Bosselaers, J. Vandewalle
  • Advances in Cryptology – Crypto ’
  • 1999

and C

J. Guajard
  • Paar, “Modified squaring algorithm”, preprint,
  • 1999
VIEW 1 EXCERPT

and Y

K. Itoh, M. Takenaka, N. Torii, S. Temm
  • Kurihara, “Fast implementation of public-key cryptography on a DSP TMS320C6201”, Cryptographic Hardware and Embedded Systems–CHES ’99, LNCS 1717,
  • 1999