Software Implementation of the NIST Elliptic Curves Over Prime Fields

  title={Software Implementation of the NIST Elliptic Curves Over Prime Fields},
  author={Michael Brown and Darrel Hankerson and Julio L{\'o}pez Hernandez and Alfred Menezes},
This paper presents an extensive study of the software implementation on workstations of the NIST-recommended elliptic curves over prime fields. We present the results of our implementation in C and assembler on a Pentium II 400 MHz workstation. We also provide a comparison with the NIST-recommended curves over binary fields. 
Highly Influential
This paper has highly influenced 25 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 447 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.
Showing 1-10 of 168 extracted citations

The design space of ultra-low energy asymmetric cryptography

2014 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS) • 2014
View 6 Excerpts
Highly Influenced

Speed Optimizations in Bitcoin Key Recovery Attacks

IACR Cryptology ePrint Archive • 2016
View 6 Excerpts
Method Support
Highly Influenced

Low-Weight JSF3 Representations for Pairs of Integers

Zhang Ya-juan, Zhu Yue-fei, KUANG Bai-Jie
View 13 Excerpts
Highly Influenced

Information Security

Lecture Notes in Computer Science • 2001
View 10 Excerpts
Method Support
Highly Influenced

448 Citations

Citations per Year
Semantic Scholar estimates that this publication has 448 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 29 references

Efficient Arithmetic on Koblitz Curves

Des. Codes Cryptography • 2000
View 3 Excerpts
Highly Influenced

and C

J. Guajard
Paar, “Modified squaring algorithm”, preprint, • 1999
View 2 Excerpts
Highly Influenced

and A

D. Hankerson, J. Hernande
Menezes, “Software implementation of elliptic curve cryptography over binary fields”, Cryptographic Hardware and Embedded Systems–CHES • 2000
View 1 Excerpt

Comparison of three modular reduction functions ”

R. Govaerts A. Bosselaers, J. Vandewalle
Advances in Cryptology – Crypto ’ • 1999

and Y

K. Itoh, M. Takenaka, N. Torii, S. Temm
Kurihara, “Fast implementation of public-key cryptography on a DSP TMS320C6201”, Cryptographic Hardware and Embedded Systems–CHES ’99, LNCS 1717, • 1999
View 2 Excerpts