2020
DOI: 10.3390/electronics9122050
|View full text |Cite
|
Sign up to set email alerts
|

A Compact Coprocessor for the Elliptic Curve Point Multiplication over Gaussian Integers

Abstract: This work presents a new concept to implement the elliptic curve point multiplication (PM). This computation is based on a new modular arithmetic over Gaussian integer fields. Gaussian integers are a subset of the complex numbers such that the real and imaginary parts are integers. Since Gaussian integer fields are isomorphic to prime fields, this arithmetic is suitable for many elliptic curves. Representing the key by a Gaussian integer expansion is beneficial to reduce the computational complexity and the me… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
17
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(17 citation statements)
references
References 60 publications
(139 reference statements)
0
17
0
Order By: Relevance
“…Public-key cryptography based on the Rivest-Shamir-Adleman (RSA) system benefits from the efficient Montgomery modulo reduction [2,3]. Similarly, elliptic curve cryptography (ECC) systems over prime fields apply Montgomery reduction to support arbitrary prime curves [4][5][6][7][8][9][10][11][12][13][14].…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…Public-key cryptography based on the Rivest-Shamir-Adleman (RSA) system benefits from the efficient Montgomery modulo reduction [2,3]. Similarly, elliptic curve cryptography (ECC) systems over prime fields apply Montgomery reduction to support arbitrary prime curves [4][5][6][7][8][9][10][11][12][13][14].…”
Section: Introductionmentioning
confidence: 99%
“…Due to the isomorphism between Gaussian integer rings and ordinary integer rings, this arithmetic is suitable for many cryptography systems. The Rabin cryptography system and elliptic curve cryptography over Gaussian integers were considered in [19][20][21][22]. Moreover, coding applications over Gaussian integers use Gaussian integer arithmetic [23][24][25][26][27][28].…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations