
This Article  
 
Share  
Bibliographic References  
Add to:  
Digg Furl Spurl Blink Simpy Del.icio.us Y!MyWeb  
Search  
 
ASCII Text  x  
Patrick Longa, Ali Miri, "Fast and Flexible Elliptic Curve Point Arithmetic over Prime Fields," IEEE Transactions on Computers, vol. 57, no. 3, pp. 289302, March, 2008.  
BibTex  x  
@article{ 10.1109/TC.2007.70815, author = {Patrick Longa and Ali Miri}, title = {Fast and Flexible Elliptic Curve Point Arithmetic over Prime Fields}, journal ={IEEE Transactions on Computers}, volume = {57}, number = {3}, issn = {00189340}, year = {2008}, pages = {289302}, doi = {http://doi.ieeecomputersociety.org/10.1109/TC.2007.70815}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, }  
RefWorks Procite/RefMan/Endnote  x  
TY  JOUR JO  IEEE Transactions on Computers TI  Fast and Flexible Elliptic Curve Point Arithmetic over Prime Fields IS  3 SN  00189340 SP289 EP302 EPD  289302 A1  Patrick Longa, A1  Ali Miri, PY  2008 KW  Public key cryptosystems KW  Parallel KW  HighSpeed Arithmetic VL  57 JA  IEEE Transactions on Computers ER   
[1] D. Hankerson, A. Menezes, and S. Vanstone, Guide to Elliptic Curve Cryptography. Springer, 2004.
[2] H. Cohen, A. Miyaji, and T. Ono, “Efficient Elliptic Curve Exponentiation Using Mixed Coordinates,” Advances in Cryptology —Proc. ASIACRYPT '98, pp. 5165, 1998.
[3] V. Dimitrov, L. Imbert, and P.K. Mishra, “Efficient and Secure Elliptic Curve Point Multiplication Using DoubleBase Chains,” Advances in Cryptology—Proc. ASIACRYPT '05, pp. 5978, 2005.
[4] M. Ciet, M. Joye, K. Lauter, and P.L. Montgomery, “Trading Inversions for Multiplications in Elliptic Curve Cryptography,” Designs, Codes, and Cryptography, vol. 39, no. 2, pp. 189206, 2006.
[5] D. Bernstein, “HighSpeed DiffieHellman, Part 2,” presentation at INDOCRYPT '06, tutorial session, 2006.
[6] M. Brown, D. Hankerson, J. Lopez, and A. Menezes, “Software Implementation of the NIST Elliptic Curves over Prime Fields,” Topics in Cryptology—CTRSA '01, pp. 250265, 2001.
[7] J. Großschädl, R. Avanzi, E. Savas, and S. Tillich, “EnergyEfficient Software Implementation of Long Integer Modular Arithmetic,” Proc. Seventh Int'l Workshop Cryptographic Hardware and Embedded Systems, pp. 7590, 2005.
[8] C.H. Lim and H.S. Hwang, “Fast Implementation of Elliptic Curve Arithmetic in ${\rm GF}({\rm p}^{\rm m})$ ,” Proc. Third Int'l Workshop Practice and Theory in Public Key Cryptography, pp. 405421, 2000.
[9] C.H. Gebotys and R.J. Gebotys, “Secure Elliptic Curve Implementations: An Analysis of Resistance to PowerAttacks in a DSP Processor,” Proc. Fifth Int'l Workshop Cryptographic Hardware and Embedded Systems, pp. 114128, 2003.
[10] R. Avanzi, “Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations,” Proc. Sixth Int'l Workshop Cryptographic Hardware and Embedded Systems, pp. 148162, 2004.
[11] D. Bernstein, “Curve25519: New DiffieHellman Speed Records,” Proc. Ninth Int'l Conf. Theory and Practice of Public Key Cryptography, pp. 229240, 2006.
[12] N. Gura, A. Patel, A. Wander, H. Eberle, and S.C. Shantz, “Comparing Elliptic Curve Cryptography and RSA on 8Bit CPUs,” Proc. Sixth Int'l Workshop Cryptographic Hardware and Embedded Systems, pp. 119132, 2004.
[13] A. Woodbury, “Efficient Algorithms for Elliptic Curve Cryptosystems on Embedded Systems,” MSc thesis, Worcester Polytechnic Inst., 2001.
[14] R. Avanzi, “Side Channel Attacks on Implementations of CurveBased Cryptographic Primitives,” Cryptology ePrint Archive, Report 2005/017, http:/eprint.iacr.org/, 2005.
[15] J.S. Coron, “Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems,” Proc. First Int'l Workshop Cryptographic Hardware and Embedded Systems, pp. 292302, 1999.
[16] P.Y. Liardet and N.P. Smart, “Preventing SPA/DPA in ECC Systems Using the Jacobi Form,” Proc. Third Int'l Workshop Cryptographic Hardware and Embedded Systems, pp. 401411, 2001.
[17] O. Billet and M. Joye, “The Jacobi Model of an Elliptic Curve and SideChannel Analysis,” Cryptology ePrint Archive, Report 2002/125, http://eprint.iacr.org/2002125/, 2002.
[18] N.P. Smart, “The Hessian Form of an Elliptic Curve,” Proc. Third Int'l Workshop Cryptographic Hardware and Embedded Systems, pp.118125, 2001.
[19] B. ChevallierMames, M. Ciet, and M. Joye, “LowCost Solutions for Preventing Simple SideChannel Analysis: SideChannel Atomicity,” IEEE Trans. Computers, vol. 53, no. 6, pp. 760768, June 2004.
[20] L. Batina, N. Mentens, B. Preneel, and I. Verbauwhede, “Balanced Point Operations for SideChannel Protection of Elliptic Curve Cryptography,” IEE Proc.—Information Security, vol. 152, no. 1, pp.5765, 2005.
[21] W. Fischer, C. Giraud, E.W. Knudsen, and J.P. Seifert, “Parallel Scalar Multiplication on General Elliptic Curves over ${\hbox{\rlap{I}\kern 2.0pt{\hbox{F}}}}_{p}$ Hedged against NonDifferential SideChannel Attacks,” IACR ePrint Archive, Report 2002/007, http:/www.iacr.org, 2002.
[22] T. Izu and T. Takagi, “A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks,” Proc. Fifth Int'l Workshop Practice and Theory in Public Key Cryptosystems, pp. 280296, 2002.
[23] T. Izu and T. Takagi, “Fast Elliptic Curve Multiplications Resistant against Side Channel Attacks,” IEICE Trans. Fundamentals, vol. E88A, no. 1, pp. 161171, 2005.
[24] R. Avanzi, H. Cohen, C. Doche, G. Frey, T. Lange, K. Nguyen, and F. Vercauteren, Handbook of Elliptic and Hyperelliptic Curve Cryptography. CRC Press, 2005.
[25] C.D. Walter, “Sliding Windows Succumbs to Big Mac Attack,” Proc. Third Int'l Workshop Cryptographic Hardware and Embedded Systems, pp. 286299, 2001.
[26] K. Aoki, F. Hoshino, T. Kobayashi, and H. Oguro, “Elliptic Curve Arithmetic Using SIMD,” Proc. Fourth Int'l Conf. Information Security, pp. 235247, 2001.
[27] T. Izu and T. Takagi, “Fast Elliptic Curve Multiplications with SIMD Operations,” Proc. Fourth Int'l Conf. Information and Comm. Security, pp. 217230, 2002.
[28] P.K. Mishra, “Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems,” IEEE Trans. Computers, vol. 55, no. 8, pp. 10001010, Aug. 2006.
[29] S.B. Xu and L. Batina, “Efficient Implementation of Elliptic Curve Cryptosystems on an ARM7 with Hardware Accelerator,” Proc. Third Int'l Conf. Information and Comm. Security, pp. 266279, 2001.
[30] K. Itoh, M. Takenaka, N. Torii, S. Temma, and Y. Kurihara, “Fast Implementation of PublicKey Cryptography on a DSP TMS320C6201,” Proc. First Int'l Workshop Cryptographic Hardware and Embedded Systems, pp. 6172, 1999.