Secure and Compact Elliptic Curve LR Scalar Multiplication

1Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Elliptic curve cryptography (ECC) can ensure an equivalent security with much smaller key sizes. Elliptic curve scalar multiplication (ECSM) is a fundamental computation used in ECC. This paper focuses on ECSM resisting simple power attack and safe error attack of side-channel attack specifically. Elliptic curve complete addition (CA) formulae can achieve secure ECSM algorithms but are inefficient from memory and computational cost perspectives. Another secure ECSM, which uses (extended) affine, is more efficient for both memory and computational costs. However, it scans input scalars from right to left. In this paper, our developed scalar multiplication algorithms also use their extended affine, but scan from left to right (LR). We also prove the security of our LR ECSM algorithms and analyze them both theoretically and experimentally. Our new LR ECSM algorithms can reduce the amount of memory by (Formula Presented) and reduce the computational time by more than 40% compared to Joye’s regular 2-ary LR algorithm with CA formulae.

References Powered by Scopus

The Montgomery Powering Ladder

381Citations
N/AReaders
Get full text

Efficient elliptic curve exponentiation using mixed coordinates

349Citations
N/AReaders
Get full text

A fast parallel elliptic curve multiplication resistant against side channel attacks

117Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Secure and Compact Elliptic Curve Scalar Multiplication with Optimized Inversion

0Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Jin, Y., & Miyaji, A. (2020). Secure and Compact Elliptic Curve LR Scalar Multiplication. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 12248 LNCS, pp. 605–618). Springer. https://doi.org/10.1007/978-3-030-55304-3_31

Readers over time

‘21‘22‘2302468

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 5

71%

Researcher 2

29%

Readers' Discipline

Tooltip

Computer Science 4

57%

Physics and Astronomy 1

14%

Mathematics 1

14%

Engineering 1

14%

Save time finding and organizing research with Mendeley

Sign up for free
0