DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chung, B | ko |
dc.contributor.author | Kim, H | ko |
dc.contributor.author | Yoon, Hyunsoo | ko |
dc.date.accessioned | 2009-08-14 | - |
dc.date.available | 2009-08-14 | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2007-03 | - |
dc.identifier.citation | IET INFORMATION SECURITY, v.1, pp.19 - 26 | - |
dc.identifier.issn | 1751-8709 | - |
dc.identifier.uri | http://hdl.handle.net/10203/10521 | - |
dc.description.abstract | An improved base-phi expansion method is proposed, in which the bit-length of coefficients is shorter and the number of coefficients is smaller than in Kobayashi's expansion method. The proposed method meshes well with efficient multi-exponentiation algorithms. In addition, two efficient algorithms based on the proposed expansion method, named phi-wNAF and phi-SJSF, are presented which significantly reduce the computational effort involved in online precomputation by using the property of Frobenius endomorphism. The proposed algorithms noticeably accelerate computation of a scalar multiplication on Koblitz curves over optimal extension fields (OEFs). In particular, for OEFs where the characteristic is close to 32 bits or 64 bits, the required number of additions is reduced up to 50% in comparison with Kobayashi's base-phi scalar multiplication algorithm. Finally, a method that significantly reduces the memory usage of the precomputation table at the expense of slightly more computation is presented. | - |
dc.language | English | - |
dc.language.iso | en_US | en |
dc.publisher | INST ENGINEERING TECHNOLOGY-IET | - |
dc.subject | ELLIPTIC-CURVES | - |
dc.subject | MULTI-EXPONENTIATION | - |
dc.subject | FROBENIUS MAP | - |
dc.subject | CRYPTOGRAPHY | - |
dc.subject | REPRESENTATIONS | - |
dc.subject | MULTIPLICATION | - |
dc.subject | CRYPTOSYSTEMS | - |
dc.subject | ALGORITHMS | - |
dc.title | Improved base-phi expansion method for Koblitz curves over optimal extension fields | - |
dc.type | Article | - |
dc.identifier.wosid | 000258888300003 | - |
dc.identifier.scopusid | 2-s2.0-34047192172 | - |
dc.type.rims | ART | - |
dc.citation.volume | 1 | - |
dc.citation.beginningpage | 19 | - |
dc.citation.endingpage | 26 | - |
dc.citation.publicationname | IET INFORMATION SECURITY | - |
dc.identifier.doi | 10.1049/iet-ifs:20060033 | - |
dc.contributor.localauthor | Yoon, Hyunsoo | - |
dc.contributor.nonIdAuthor | Chung, B | - |
dc.contributor.nonIdAuthor | Kim, H | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordPlus | ELLIPTIC-CURVES | - |
dc.subject.keywordPlus | MULTI-EXPONENTIATION | - |
dc.subject.keywordPlus | FROBENIUS MAP | - |
dc.subject.keywordPlus | CRYPTOGRAPHY | - |
dc.subject.keywordPlus | REPRESENTATIONS | - |
dc.subject.keywordPlus | MULTIPLICATION | - |
dc.subject.keywordPlus | CRYPTOSYSTEMS | - |
dc.subject.keywordPlus | ALGORITHMS | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.