7
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Speeding Up Elliptic Curve Multiplication with Mixed-base Representation for Applications to SIDH Ciphers

      Preprint
      ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Elliptic curve multiplications can be improved by replacing the standard ladder algorithm's base 2 representation of the scalar multiplicand, with mixed-base representations with power-of-2 bases, processing the n bits of the current digit in one optimized step. For this purpose, we also present a new methodology to compute short Weierstrass form elliptic curve operations of the type mP+nQ, where m and n are small integers, aiming for faster implementation with the lowest cost among previous algorithms, using only one inversion. In particular, the proposed techniques enable more opportunities for optimizing computations, leading to an important speed-up for applications based on elliptic curves, including the post-quantum cryptosystem Super Singular Isogeny Diffie Hellman (SIDH).

          Related collections

          Most cited references9

          • Record: found
          • Abstract: not found
          • Article: not found

          Elliptic Curve Cryptosystems

            Bookmark
            • Record: found
            • Abstract: not found
            • Book Chapter: not found

            Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Constructing elliptic curve isogenies in quantum subexponential time

                Bookmark

                Author and article information

                Journal
                15 May 2019
                Article
                1905.06492
                d1ebe0c4-8bbe-4610-9a89-0f440e3eb143

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                cs.CR math.NT

                Security & Cryptology,Number theory
                Security & Cryptology, Number theory

                Comments

                Comment on this article