2018
DOI: 10.1007/s13389-018-0190-0
|View full text |Cite
|
Sign up to set email alerts
|

Euclidean addition chains scalar multiplication on curves with efficient endomorphism

Abstract: To cite this version:Fangan-Yssouf Dosso, Fabien Herbaut, Nicolas Méloni, Pascal Véron. Euclidean addition chains scalar multiplication on curves with efficient endomorphism. Journal of Cryptographic Engineering, Springer, In press, <10.1007/s13389-018-0190-0>. Noname manuscript No. (will be inserted by the editor) Euclidean addition chains scalar multiplication on curves with efficient endomorphismThis is a pre-print of an article published in "Journal of Cryptographic Engineering". The final au… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
18
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(18 citation statements)
references
References 30 publications
(52 reference statements)
0
18
0
Order By: Relevance
“…According to (Dosso et al, 2018), this approach fits well with the GLV-like context of an elliptic curve endowed with an efficiently computable endomorphism. Indeed, the method described in (Dosso et al, 2018) leads to a simple and compact way to compute the elliptic curve scalar multiplication kP (ECSM) for a Diffie-Hellman key exchange protocol. The main drawback of this method is that it requires the use of a larger curve as compared to other methods for the same security level.…”
Section: Purpose and Main Ideamentioning
confidence: 77%
See 4 more Smart Citations
“…According to (Dosso et al, 2018), this approach fits well with the GLV-like context of an elliptic curve endowed with an efficiently computable endomorphism. Indeed, the method described in (Dosso et al, 2018) leads to a simple and compact way to compute the elliptic curve scalar multiplication kP (ECSM) for a Diffie-Hellman key exchange protocol. The main drawback of this method is that it requires the use of a larger curve as compared to other methods for the same security level.…”
Section: Purpose and Main Ideamentioning
confidence: 77%
“…The aim of this paper is to improve the method described in Section 4 of (Dosso et al, 2018). First, we obtain an asymptotic reduction of 7.97% of the size of the base field required.…”
Section: Purpose and Main Ideamentioning
confidence: 99%
See 3 more Smart Citations