CN107040380A - A kind of improvement mould of the elliptic curve cryptosystem based on binary field removes method - Google Patents

A kind of improvement mould of the elliptic curve cryptosystem based on binary field removes method Download PDF

Info

Publication number
CN107040380A
CN107040380A CN201710443912.XA CN201710443912A CN107040380A CN 107040380 A CN107040380 A CN 107040380A CN 201710443912 A CN201710443912 A CN 201710443912A CN 107040380 A CN107040380 A CN 107040380A
Authority
CN
China
Prior art keywords
register
value
minimum
twice
mould
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710443912.XA
Other languages
Chinese (zh)
Inventor
郭东辉
林思远
郭鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen University
Original Assignee
Xiamen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen University filed Critical Xiamen University
Priority to CN201710443912.XA priority Critical patent/CN107040380A/en
Publication of CN107040380A publication Critical patent/CN107040380A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/3033Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters details relating to pseudo-prime or prime number generation, e.g. primality test
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Algebra (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Error Detection And Correction (AREA)

Abstract

A kind of improvement mould of the elliptic curve cryptosystem based on binary field removes method, is related to domain operation method.A kind of improvement mould for about subtracting the fast elliptic curve cryptosystem based on binary field of efficiency high, arithmetic speed is provided and removes algorithm.According to r (t)=y (t)/x (t) mod F (t), register A, B, U, V are first assigned correspondence initial value by algorithm, again by disposably judging the value of minimum two bit binary data in register, realize correspondence about reducing, it is mould division result r (t) until the numerical value stored in register A is reduced to the numerical value stored in 1, register U.Algorithm is realized by Verilog language and emulated, contrast improved Euclidean algorithm and fermat's little theorem algorithm, the algorithm has advantage in terms of time loss, mould is effectively accelerated except calculating, available in ECC encryption and decryption IP kernels.

Description

A kind of improvement mould of the elliptic curve cryptosystem based on binary field removes method
Technical field
The present invention relates to domain operation method, more particularly, to a kind of changing for elliptic curve cryptosystem based on binary field Progressive die removes method.
Background technology
With the development of science and technology, our quality of life has obtained huge improvement, at the same time, and information security is asked Topic is also increasingly severe, does not threaten our property safety and individual privacy all the time.Because different scenes have different Demand, the encryption system used is also therefore different with AES, current encryption system mainly have symmetric cryptography with Two kinds of asymmetric encryption.
Public key encryption system was proposed jointly in 1976 from Diffie.W and Hellman.M, and it becomes grinds for cryptography Study carefully the important topic in field, and played a significant role all the time in terms of information security.It is different from symmetric cryptography, asymmetric encryption Communicating pair has the public key and private key of oneself respectively.It is at present to be based on three big difficult math questions, one for public key encryption system construction It is big number Factorization intractability, two be discrete logarithm intractability, and three be Elliptic Curve Discrete Logarithm intractability.Elliptic curve is close The foundation for security of code system is Elliptic Curve Discrete Logarithm intractability, and the system is by Miller ([1] V.S.Miller, " Use of elliptic curves in cryptography,”Advances in Cryptology-CRYPTO’85 Proceedings.Springer, 1986, pp.417-426) and Koblitz ([2] N.Koblitz, " Elliptic curve Cryptosystems, " Mathematics of computation, vol.48, no.177, pp.203-209,1987) carried Go out.Elliptic curve is typically expressed as y2+ axy+by=x3+cx2+ dx+e, this kind of curve is referred to as Weierstrass equations, curve by All points (x, y) for meeting the equation are collectively constituted, in hardware design, generally using its special shape y2+ xy=x3+ax2+ 1, wherein a value is 0 or, 1, and the curve of the form is referred to as Koblitz elliptic curves.
Elliptic curve cryptosystem is to calculate to realize in finite field, and finite field is divided into binary field GF (2m) and prime number Domain GF (p), wherein binary field are adapted to hardware and realized, the major calculations of elliptic curve cryptosystem have point processing and domain operation, Point processing is constituted by point plus with the point times dot product constituted.Domain operation is added by mould, mould square, modular multiplication, mould are inverse is constituted.Its In, the inverse time loss of mould is most, and the algorithm of research modular inversion has following a few classes to represent at present:One be extension Europe it is several in Obtain related algorithm ([3] J.H.Guo, C.L.Wang, " Systolic array implementation of Euclid's algorithm for inversion and division in GF(2m)”.IEEE Transactions on Computers.1998,47(10):1161-1167), two be extension Euclid's innovatory algorithm ([4] S.C.Shantz, " From Euclid’s GCD to Montgomery multiplication to the great divide,”Tech.Rep.TR- 2001-95, Sun Microsystems, 1995), three be based on fermat's little theorem inversion algorithms ([5] T.Itoh, S.Tsujii,“A Fast Algorithm for Computing Multiplicative Inverses in GF(2m) Using Normal Bases,”IECE,Japan,1986,pp.31–36Paper of Technical Group,TGIT86- 44.) fermat's little theorem algorithm (M.J.Zhi, " Design and Implementation of Elliptic Curve, are improved Cryptography over GF(2m)”,Dissertation of Shanghai Jiao Tong University, 2007)。
The content of the invention
It is fast it is an object of the invention to provide can verify that, arithmetic speed, pass through minimum two of disposable test data Parity, reduces time loss, and a kind of based on the ellipse of binary field of the fast domain operation of efficiency high, arithmetic speed is about subtracted to realize The improvement mould of circular curve cipher system removes method.
The improvement mould of elliptic curve cryptosystem of the invention based on binary field comprises the following steps except one of method:
1) according to the relative theory of elliptic curve cryptosystem, it is located at binary field GF (2m) in, it is known that two exponent numbers are small In threshold value m element x (t) and y (t), respectively as two input elements, while according to NIST (American National Standard and technology Research institute) the Koblitz elliptic curve parameters recommended, one known exponent number of selection is equal to threshold value m irreducible polynomial F (t);Formula r (t)=y (t)/x (t) mod F (t) are removed according to mould, mould division result r (t) are obtained, or be expressed as y (t) ≡ r (t) x (t)mod F(t);By using intermediate data required in four register A, B, U, V storage algorithms, reach and formula r is removed to mould (t)=y (t)/x (t) mod F (t), or y (t) ≡ r (t) x (t) mod F (t) are iterated the purpose for about subtracting calculating, first, according to It is secondary that initialization assignment is carried out to described four registers A, B, U, V;
2) after four registers A, B, U, V are completed with initial assignments, algorithm starts to being stored in register A, B Numerical value, which is iterated, about to be subtracted, during about subtracting, and four registers A, B, U, V need to maintain A × y (t) ≡ U × x (t) all the time The identity of mod F (t) and B × y (t) ≡ V × two formula of x (t) mod F (t), from A × y (t) ≡ U × x (t) mod F (t) And B × y (t) ≡ V × formula of x (t) mod F (t) two are observed, when changing for the numerical value stored in register A, B Afterwards, the numerical value stored in register U, V can also change therewith;
3) algorithm uses the shifting in hardware operation by the low level parity for the intermediate value for judging to be stored in register Position and XOR complete iteration and about subtract calculating;
4) iteration Jing Guo certain round will be reduced to 1 with about subtracting the numerical value stored in calculating, register A, entirely remove The process of method computing is terminated, if U now is UA=1, then identity now will be changed into y (t) ≡ UA=1X (t) mod F (t), i.e., UA=1Value it is identical with the r (t) in formula r (t)=y (t)/x (t) mod F (t), now, register U storage numerical value removed for mould As a result r (t).
The improvement mould of elliptic curve cryptosystem of the invention based on binary field removes the two of method, comprises the following steps:
1) when minimum two of register A are 00, register A will be carried out continuously and move to left twice;Then judge register U's Numerical value, if minimum two of register U are 00, register U will be carried out continuously and move to left twice;If minimum the two of register U Position is 10, and register U value will be changed into register U and continuously move to left the data sum moved to left twice with F (t) once;If deposit Minimum two of device U are 01, register U value will be changed into register U continuously move to left moved to left twice with F (t) data twice it With;If minimum two of register U are 11, register U value will be changed into register U and continuously move to left to move to left two with F (t) twice Secondary data move to left data sum once with F (t);
2) when minimum two of register A are 10, register A will be moved to left once;Then register U number is judged Value, if register U is even number, then register U will be moved to left once;If register U is odd number, register U value 1/2nd of register U and F (t) sums will be changed into;
3) when minimum two of register B are 00, register B will be carried out continuously and move to left twice;Then judge register V's Numerical value, if minimum two of register V are 00, register V will be carried out continuously and move to left twice;If minimum the two of register V Position is 10, and register V value will be changed into register V and continuously move to left the data sum moved to left twice with F (t) once;If deposit Minimum two of device V are 01, register V value will be changed into register V continuously move to left moved to left twice with F (t) data twice it With;If minimum two of register V are 11, register V value will be changed into register V and continuously move to left to move to left two with F (t) twice Secondary data move to left data sum once with F (t);
4) when minimum two of register B are 10, register B will be moved to left once;Then register V number is judged Value, if register V is even number, then register V will be moved to left once;If register V is odd number, register V value 1/2nd of register V and F (t) sums will be changed into;
5) when register A is more than register B, A=(A+B)/2 and U=U+V operations are completed first;Then deposit is judged Device U value, if register U is even number, then register U will be moved to left once, if register U is odd number, then post Storage U value will be changed into 1/2nd of register U and F (t) sums;
6) during remaining situation, B=(A+B)/2 and V=U+V operations are completed first;Then register V value is judged, if Register V is even number, then register V will be moved to left once, if register V is odd number, register V value will be changed into posting Storage V and 1/2nd of F (t) sums;
7) register U value is finally returned to, its value stored is mould division result r (t).
A kind of improvement mould of elliptic curve cryptosystem based on binary field designed by the present invention removes algorithm, right Shantz moulds are improved except algorithm, and specific improved procedure is algorithm to be iterated during about subtracting, and will be sentenced every time The parity of the minimum double figures value of the numerical value stored in disconnected register, on the premise of increase is not many hardware resources, Accelerate calculating process.
The present invention is also based on the design of binary field progress.
In order to meet the demand that every field communicates for actual time safety, the security of AES should be strengthened, again Improve the arithmetic speed of AES.
Brief description of the drawings
Fig. 1 is register A, U operational block diagram of inventive algorithm.
Fig. 2 is register B, the V operation block diagram of inventive algorithm.
Fig. 3 is the emulation comparative result that inventive algorithm consumes clock number under 50MHz clocks with other mould algorithm for inversions.
Fig. 4 is emulation comparative result of the inventive algorithm under 50MHz clocks with other mould algorithm for inversion throughputs.
Embodiment
Embodiments of the present invention are described further below with reference to Figure of description.
The present invention is that a kind of improvement mould of the elliptic curve cryptosystem based on binary field removes algorithm, is entered using the present invention The algorithm structure block diagram of row Modulo division refers to Fig. 1 and Fig. 2, and algorithm includes procedure below:
1. initiation parameter:Inventive algorithm is designed is based on binary field GF (2 with checking implementationm), user according to The Koblitz elliptic curve parameters that NIST recommends, two exponent numbers of setting are less than threshold value m element x (t) and y (t), respectively as The molecule denominator of input, then, one exponent number of setting are equal to threshold value m irreducible polynomial F (t).
2. initialization register:Four registers A, B, U, V will be used in the present invention, following initialization is carried out respectively and is assigned Value:A←x(t),B←F(t),U←y(t),V←0.
3. iteration about subtracts:
Complete after initial assignment, algorithm starts to be iterated input and about subtracted, and about subtracts process by judging institute in register The low level parity of the numerical value of storage, to complete corresponding displacement and xor operation, is embodied as:
1) as A [1:0]==00, A=A/4.U value is judged again, if U [1:0]==00, U=U/4;If U [1:0]= =10, U=U/4+F (t)/2;If U [1:0]==01, U=U/4+F (t)/4;If U [1:0]==11, U=U/4+F (t)/4+ F(t)/2。
2) as A [1:0]==10, A=A/2.U value is judged again, if U is even number, U=U/2;If U is odd number, U=(U+ F(t))/2。
3) as B [1:0]==00, B=B/4.V value is judged again, if V [1:0]==00, V=V/4;If V [1:0]= =10, V=V/4+F (t)/2;If V [1:0]==01, V=V/4+F (t)/4;If V [1:0]==11, V=V/4+F (t)/4+ F(t)/2。
4) as B [1:0]==10, B=B/2.V value is judged again, if V is even number, V=V/2;If V is odd number, V=(V+ F(t))/2。
5) as A > B, A=(A+B)/2 and U=U+V.U value is judged again, if U is even number, U=U/2, if U is odd number, U=(U+F (t))/2.
6) in the case of remaining, B=(A+B)/2, V=U+V operations.V value is judged again, if V is even number, V=V/2, such as Fruit V is odd number, V=(V+F (t))/2.
4. output result:Iteration by certain round about subtracts, and register A numerical value is reduced to 1, if now U is UA=1, then There are y (t) ≡ UA=1X (t) mod F (t), i.e. UA=1It is equal with the r (t) in r (t)=y (t)/x (t) mod F (t), therefore register U The numerical value of storage is mould division result r (t).Wherein inventive algorithm carries out the phase that minimum two bits parity judges to register A, U Operation (register B, V are similarly) is closed, reference can be made to table 1.
Table 1
Table 2
Frequency Area Critical Path Delay Cell
250MHz 0.253mm2 3.78ns 11864
Table 3
Degree(m) 163 233 283 409
Time(ns) 4480 6240 7580 11320
Clock 224 312 379 566
5. simulation result:With reference to Fig. 3, it can be seen that inventive algorithm is under 50MHz clocks, when being consumed with other mould algorithm for inversions Clock
Several comparing results.With reference to Fig. 4, it can be seen that inventive algorithm is handled up under 50MHz clocks with other mould algorithm for inversions The comparing result of rate.
Synthesis result of the inventive algorithm under 0.18CMOS techniques, referring to table 2, inventive algorithm is in 50MHz clocks Under different threshold values when consume clock number, referring to table 3.It can be seen that comprehensive knot of the inventive algorithm under 0.18CMOS techniques Really.It can be seen that inventive algorithm consumes clock number in 50MHz clocks, different threshold values are lower.
The present invention is according to r (t)=y (t)/x (t) mod F (t), and it is initial that register A, B, U, V are first assigned correspondence by algorithm Value, then by disposably judging the value of minimum two bit binary data in register, correspondence about reducing is realized, until register It is mould division result r (t) that the numerical value stored in A, which is reduced to the numerical value stored in 1, register U,.Realized and calculated by Verilog language Method is simultaneously emulated, and contrasts improved Euclidean algorithm and fermat's little theorem algorithm, and the algorithm has advantage in terms of time loss, Mould is effectively accelerated except calculating, available in ECC encryption and decryption IP kernels.

Claims (2)

1. a kind of improvement mould of the elliptic curve cryptosystem based on binary field removes method, it is characterised in that including following step Suddenly:
1) according to the relative theory of elliptic curve cryptosystem, it is located at binary field GF (2m) in, it is known that two exponent numbers are less than threshold value M element x (t) and y (t), respectively as two input elements, while according to NIST (National Institute of Standards and Technology) The Koblitz elliptic curve parameters recommended, one known exponent number of selection is equal to threshold value m irreducible polynomial F (t);According to Mould removes formula r (t)=y (t)/x (t) mod F (t), obtains mould division result r (t), or be expressed as y (t) ≡ r (t) x (t) mod F (t);By using intermediate data required in four register A, B, U, V storage algorithms, reach and formula r (t)=y is removed to mould (t)/x (t) mod F (t), or y (t) ≡ r (t) x (t) mod F (t) are iterated the purpose for about subtracting calculating, first, successively to institute State four registers A, B, U, V and carry out initialization assignment;
2) after four registers A, B, U, V are completed with initial assignment, algorithm starts the numerical value to being stored in register A, B It is iterated and about subtracts, during about subtracting, four registers A, B, U, V needs to maintain A × y (t) ≡ U × x (t) mod all the time The identity of F (t) and B × y (t) ≡ V × two formula of x (t) mod F (t), from A × y (t) ≡ U × x (t) mod F (t) and B × y (t) ≡ V × formula of x (t) mod F (t) two are observed, it is changed when the numerical value stored in register A, B Afterwards, the numerical value stored in register U, V can also change therewith;
3) algorithm is by the low level parity for the intermediate value for judging to be stored in register, using the displacement in hardware operation and XOR completes iteration and about subtracts calculating;
4) iteration Jing Guo certain round will be reduced to 1, whole division fortune with about subtracting the numerical value stored in calculating, register A The process of calculation is terminated, if U now is UA=1, then identity now will be changed into y (t) ≡ UA=1X (t) mod F (t), i.e. UA=1 Value it is identical with the r (t) in formula r (t)=y (t)/x (t) mod F (t), now, register U storage numerical value for mould except knot Fruit r (t).
2. a kind of improvement mould of the elliptic curve cryptosystem based on binary field removes method, it is characterised in that including following step Suddenly:
1) when minimum two of register A are 00, register A will be carried out continuously and move to left twice;Then register U number is judged Value, if minimum two of register U are 00, register U will be carried out continuously and move to left twice;If minimum two of register U For 10, register U value will be changed into register U and continuously move to left the data sum moved to left twice with F (t) once;If register U Minimum two be 01, register U value will be changed into register U and continuously move to left the data sum moved to left twice with F (t) twice; If minimum two of register U are 11, register U value will be changed into register U and continuously move to left to move to left twice with F (t) twice Data and F (t) move to left data sum once;
2) when minimum two of register A are 10, register A will be moved to left once;Then register U numerical value is judged, such as Fruit register U is even number, then register U will be moved to left once;If register U is odd number, register U value will be changed into Register U and 1/2nd of F (t) sums;
3) when minimum two of register B are 00, register B will be carried out continuously and move to left twice;Then register V number is judged Value, if minimum two of register V are 00, register V will be carried out continuously and move to left twice;If minimum two of register V For 10, register V value will be changed into register V and continuously move to left the data sum moved to left twice with F (t) once;If register V Minimum two be 01, register V value will be changed into register V and continuously move to left the data sum moved to left twice with F (t) twice; If minimum two of register V are 11, register V value will be changed into register V and continuously move to left to move to left twice with F (t) twice Data and F (t) move to left data sum once;
4) when minimum two of register B are 10, register B will be moved to left once;Then register V numerical value is judged, such as Fruit register V is even number, then register V will be moved to left once;If register V is odd number, register V value will be changed into Register V and 1/2nd of F (t) sums;
5) when register A is more than register B, A=(A+B)/2 and U=U+V operations are completed first;Then judge register U's Value, if register U is even number, then register U will be moved to left once, if register U is odd number, then register U Value will be changed into 1/2nd of register U and F (t) sums;
6) during remaining situation, B=(A+B)/2 and V=U+V operations are completed first;Then register V value is judged, if deposit Device V is even number, then register V will be moved to left once, if register V is odd number, register V value will be changed into register V and 1/2nd of F (t) sums;
7) register U value is finally returned to, its value stored is mould division result r (t).
CN201710443912.XA 2017-06-13 2017-06-13 A kind of improvement mould of the elliptic curve cryptosystem based on binary field removes method Pending CN107040380A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710443912.XA CN107040380A (en) 2017-06-13 2017-06-13 A kind of improvement mould of the elliptic curve cryptosystem based on binary field removes method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710443912.XA CN107040380A (en) 2017-06-13 2017-06-13 A kind of improvement mould of the elliptic curve cryptosystem based on binary field removes method

Publications (1)

Publication Number Publication Date
CN107040380A true CN107040380A (en) 2017-08-11

Family

ID=59542099

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710443912.XA Pending CN107040380A (en) 2017-06-13 2017-06-13 A kind of improvement mould of the elliptic curve cryptosystem based on binary field removes method

Country Status (1)

Country Link
CN (1) CN107040380A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019120066A1 (en) * 2017-12-20 2019-06-27 云图有限公司 Fast mode reduction method and medium suitable for sm2 algorithm
CN110999207A (en) * 2017-08-15 2020-04-10 区块链控股有限公司 Computer-implemented method of generating a threshold library

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110999207A (en) * 2017-08-15 2020-04-10 区块链控股有限公司 Computer-implemented method of generating a threshold library
CN110999207B (en) * 2017-08-15 2024-05-31 区块链控股有限公司 Computer-implemented method of generating a threshold library
WO2019120066A1 (en) * 2017-12-20 2019-06-27 云图有限公司 Fast mode reduction method and medium suitable for sm2 algorithm

Similar Documents

Publication Publication Date Title
CN112685758B (en) Data encryption system based on elliptic curve encryption algorithm
US20220385466A1 (en) Prime number generation for encryption
CN107040380A (en) A kind of improvement mould of the elliptic curve cryptosystem based on binary field removes method
Putranto et al. Another concrete quantum cryptanalysis of binary elliptic curves
US8804952B2 (en) System and method for securing scalar multiplication against differential power attacks
Venkatesh et al. Reconfigurable architecture to speed-up modular exponentiation
CN114594925B (en) Efficient modular multiplication circuit suitable for SM2 encryption operation and operation method thereof
Aung et al. Implementation of elliptic curve arithmetic operations for prime field and binary field using java BigInteger class
Kobayashi et al. Fast modular inversion algorithm to match any operation unit
Selma et al. Elliptic curve cryptographic processor design using FPGAs
US8861721B2 (en) System and method for securing scalar multiplication against simple power attacks
WO2015199675A1 (en) System and method for securing scalar multiplication against differential power attacks
Brown CM55: special prime-field elliptic curves almost optimizing den Boer's reduction between Diffie-Hellman and discrete logs
Aswathy et al. Modified RSA public key algorithm
Shylashree et al. Efficient Implementation of Scalar Multiplication for Elliptic Curve Cryptography using Ancient Indian Vedic Mathematics over GF (p)
Li Area-Time Efficient High-Radix Modular Inversion Algorithm and Hardware Implementation for ECC over Prime Fields
Realpe-Muñoz et al. Design of elliptic curve cryptoprocessors over GF (2 163) on Koblitz curves
Rahman et al. Area-Time Effective Modular Multiplication for Elliptic Curve Cryptography
Yünüak Modular exponentiation methods in cryptography
Realpe-Muñoz et al. High-Performance Architectures for Finite Field Inversion Over GF (2163)
Bilal et al. High speed point arithmetic architecture for ecc on FPGA
Bojie et al. Elliptic curve cryptography a public key system
Harb et al. Accelerating Square Root Computations Over Large GF (2m).
Lee et al. Low-complexity linear array multiplier for normal basis of type-II
Lutz et al. High-performance finite field multiplier for cryptographic applications

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170811