2022
DOI: 10.21203/rs.3.rs-862241/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

A Comparison among Fast Point Multiplication Algorithms in Elliptic Curve Cryptosystem

Abstract: In the Elliptic Curve Cryptosystem, the multiplication of points is essential in the successful computation of any operation. Reduction of time complexity for the mathematical operations in Elliptic Curve Cryptosystems with minimum hardware resources, the methods: Addition and Subtraction, Mutual Opposite Form, and Complementary Recoding techniques proposed as fast scalar multiplication schemes. The fast-point multiplication method is always necessary for any mathematical operation on an Elliptic Curve Cryptos… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…Sasmita Padhy, T.N. Shankar, and Sachikanta Dash (2022) [10] compared the performance of fast point multiplication algorithms in terms of computation and execution time to determine the quickest solution for elliptic curve cryptosystems. The authors focused on evaluating different techniques, such as addition and subtraction, mutual opposite form (MOF), and complementary recoding, for fast scalar multiplication schemes.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Sasmita Padhy, T.N. Shankar, and Sachikanta Dash (2022) [10] compared the performance of fast point multiplication algorithms in terms of computation and execution time to determine the quickest solution for elliptic curve cryptosystems. The authors focused on evaluating different techniques, such as addition and subtraction, mutual opposite form (MOF), and complementary recoding, for fast scalar multiplication schemes.…”
Section: Literature Reviewmentioning
confidence: 99%
“…It is a visual detection of diseases by analyzing a huge amount of image data, processing and interpreting them to understand the structural changes of the lesion sites of patients. Machine learning [7][8][9][10] This paper makes the following contributions: Section 2 discusses literature survey, section 3 explains about the proposed approach, Section 4 discusses about the experimental setup, Section 5 discusses concludes.…”
Section: Introductionmentioning
confidence: 99%
“…Six 𝐸𝐢𝑆𝑀 algorithms were examined in this work. Some of the conventional scalar recoding algorithms have been investigated and examined including the binary method [10], the Non-Adjacent Form (𝑁𝐴𝐹) method [13], Window πœ” βˆ’ βˆ’π‘π‘œπ‘› π΄π‘‘π‘—π‘Žπ‘π‘’π‘›π‘‘ πΉπ‘œπ‘Ÿπ‘š(πœ” βˆ’ 𝑁𝐴𝐹 ) method [14], Mutual Opposite Form (𝑀𝑂𝐹) method [15], Direct Recoding Method (𝐷𝑅𝑀) [16], and Complementary Recoding Technique (𝐢𝑅𝑇) [17].…”
Section: Introductionmentioning
confidence: 99%