Software Implementation of the NIST Elliptic Curves Over Prime Fields

@inproceedings{Brown2001SoftwareIO,
  title={Software Implementation of the NIST Elliptic Curves Over Prime Fields},
  author={Michael Brown and Darrel Hankerson and Julio L{\'o}pez Hernandez and Alfred Menezes},
  booktitle={CT-RSA},
  year={2001}
}
  • Michael Brown, Darrel Hankerson, +1 author Alfred Menezes
  • Published in CT-RSA 2001
  • Computer Science
  • This paper presents an extensive study of the software implementation on workstations of the NIST-recommended elliptic curves over prime fields. We present the results of our implementation in C and assembler on a Pentium II 400MHz workstation. We also provide a comparison with the NIST-recommended curves over binary fields. 

    Create an AI-powered research feed to stay up to date with new papers like this posted to ArXiv

    Tables and Topics from this paper.

    Citations

    Publications citing this paper.
    SHOWING 1-10 OF 209 CITATIONS

    NEW TYPE OF OPTIMAL EXTENSION FIELDS AND ITS APPLICATIONS

    VIEW 9 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    Optimization and guess-then-solve attacks in cryptanalysis

    VIEW 4 EXCERPTS
    CITES BACKGROUND
    HIGHLY INFLUENCED

    Low-Weight JSF3 Representations for Pairs of Integers

    VIEW 13 EXCERPTS
    CITES BACKGROUND
    HIGHLY INFLUENCED

    Implementations of Elliptic Curve Cryptography

    VIEW 4 EXCERPTS
    CITES BACKGROUND & METHODS
    HIGHLY INFLUENCED

    Speeding up subgroup cryptosystems

    VIEW 4 EXCERPTS
    CITES BACKGROUND & METHODS
    HIGHLY INFLUENCED

    Information Security

    VIEW 10 EXCERPTS
    CITES BACKGROUND & METHODS
    HIGHLY INFLUENCED

    Securing Elliptic Curve Point Multiplication against Side-Channel Attacks

    VIEW 7 EXCERPTS
    CITES BACKGROUND & METHODS
    HIGHLY INFLUENCED

    A Fault-Based Secret Key Retrieval Method for ECDSA: Analysis and Countermeasure

    VIEW 3 EXCERPTS
    CITES BACKGROUND
    HIGHLY INFLUENCED

    FILTER CITATIONS BY YEAR

    2001
    2019

    CITATION STATISTICS

    • 24 Highly Influenced Citations

    • Averaged 8 Citations per year from 2017 through 2019

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 27 REFERENCES

    Efficient Arithmetic on Koblitz Curves

    VIEW 3 EXCERPTS
    HIGHLY INFLUENTIAL

    and A

    • D. Hankerson, J. Hernande
    • Menezes, “Software implementation of elliptic curve cryptography over binary fields”, Cryptographic Hardware and Embedded Systems–CHES
    • 2000
    VIEW 1 EXCERPT

    and C

    • J. Guajard
    • Paar, “Modified squaring algorithm”, preprint,
    • 1999
    VIEW 1 EXCERPT

    and Y

    • K. Itoh, M. Takenaka, N. Torii, S. Temm
    • Kurihara, “Fast implementation of public-key cryptography on a DSP TMS320C6201”, Cryptographic Hardware and Embedded Systems–CHES ’99, LNCS 1717,
    • 1999
    VIEW 1 EXCERPT