Secure and Compact Elliptic Curve LR Scalar Multiplication

1Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Elliptic curve cryptography (ECC) can ensure an equivalent security with much smaller key sizes. Elliptic curve scalar multiplication (ECSM) is a fundamental computation used in ECC. This paper focuses on ECSM resisting simple power attack and safe error attack of side-channel attack specifically. Elliptic curve complete addition (CA) formulae can achieve secure ECSM algorithms but are inefficient from memory and computational cost perspectives. Another secure ECSM, which uses (extended) affine, is more efficient for both memory and computational costs. However, it scans input scalars from right to left. In this paper, our developed scalar multiplication algorithms also use their extended affine, but scan from left to right (LR). We also prove the security of our LR ECSM algorithms and analyze them both theoretically and experimentally. Our new LR ECSM algorithms can reduce the amount of memory by (Formula Presented) and reduce the computational time by more than 40% compared to Joye’s regular 2-ary LR algorithm with CA formulae.

Cite

CITATION STYLE

APA

Jin, Y., & Miyaji, A. (2020). Secure and Compact Elliptic Curve LR Scalar Multiplication. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 12248 LNCS, pp. 605–618). Springer. https://doi.org/10.1007/978-3-030-55304-3_31

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free