Software implementation of binary elliptic curves: impact of the carry-less multiplier on scalar multiplication

  title={Software implementation of binary elliptic curves: impact of the carry-less multiplier on scalar multiplication},
  author={Jonathan Taverne and Armando Faz-Hern{\'a}ndez and Diego F. Aranha and Francisco Rodr{\'i}guez-Henr{\'i}quez and Darrel Hankerson and Julio L{\'o}pez Hernandez},
  booktitle={IACR Cryptology ePrint Archive},
The availability of a new carry-less multiplication instruction in the latest Intel desktop processors significantly accelerates multiplication in binary fields and hence presents the opportunity for reevaluating algorithms for binary field arithmetic and scalar multiplication over elliptic curves. We describe how to best employ this instruction in field multiplication and the effect on performance of doubling and halving operations. Alternate strategies for implementing inversion and half… CONTINUE READING
Highly Cited
This paper has 20 citations. REVIEW CITATIONS
Related Discussions
This paper has been referenced on Twitter 3 times. VIEW TWEETS


Publications citing this paper.
Showing 1-10 of 14 extracted citations

Optimal software-implemented Itoh-Tsujii inversion for GF(2m)

IACR Cryptology ePrint Archive • 2015
View 10 Excerpts
Highly Influenced

On Elliptic Curve Cryptography implementations and evaluation

2016 2nd International Conference on Advanced Technologies for Signal and Image Processing (ATSIP) • 2016
View 1 Excerpt

Parallel Implementation of ECC Point Multiplication on a Homogeneous Multi-Core Microcontroller

2016 12th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN) • 2016
View 1 Excerpt

Optimizing elliptic curve scalar multiplication with near-factorization

2014 11th International Conference on Security and Cryptography (SECRYPT) • 2014


Publications referenced by this paper.
Showing 1-10 of 39 references

Batch Binary Edwards

CRYPTO • 2009
View 4 Excerpts
Highly Influenced

Efficient Arithmetic on Koblitz Curves

Des. Codes Cryptography • 2000
View 4 Excerpts
Highly Influenced

Instruction tables: List of instruction latencies, throughputs and micro-operation breakdowns for Intel, AMD and VIA CPUs, tables.pdf

A. Fog
View 1 Excerpt

ECC2K-130 on Cell CPUs

IACR Cryptology ePrint Archive • 2010
View 2 Excerpts

Similar Papers

Loading similar papers…