首页> 外文会议>International Workshop on Practice and Theory in Public Key Cryptosystems >A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks
【24h】

A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks

机译:快速并行椭圆曲线乘法抵抗侧通道攻击

获取原文

摘要

This paper proposes a fast elliptic curve multiplication algorithm applicable for any types of curves over finite fields (p a prime), based on [Mon87], together with criteria which make our algorithm resistant against the side channel attacks (SCA). The algorithm improves both on an addition chain and an addition formula in the scalar multiplication. Our addition chain requires no table look-up (or a very small number of pre-computed points) and a prominent property is that it can be implemented in parallel. The computing time for n-bit scalar multiplication is one ECDBL + (n-1) ECADDs in the parallel case and (n-1) ECDBLs + (n-1) ECADDs in the single case. We also propose faster addition formulas which only use the x-coordinates of the points. By combination of our addition chain and addition formulas, we establish a faster scalar multiplication resistant against the SCA in both single and parallel computation. The improvement of our scalar multiplications over the previous method is about 37% for two processors and 5.7% for a single processor. Our scalar multiplication is suitable for the implementation on smart cards.
机译:本文提出了适用于任何类型的有限域上的曲线(对素数),基于[Mon87]快速椭圆曲线乘法算法,以它们使我们的算法针对侧信道攻击(SCA)耐标准在一起。该算法改进了的添加链,并在标量乘法加法式两者。我们除了链无需查表(或极少数的预先计算点)和一个突出特性是它可以并行执行。为n位的标量乘法的计算时间是一个ECDBL +(N-1)在平行的情况ECADDs和(n-1)+ ECDBLs第(n-1)ECADDs在单个壳体。我们还建议加快加法公式只使用点的x坐标。通过我们的加法链和加法公式的组合,我们建立更快速的标量乘法不要在这两个单和并行计算的SCA性。我们的标量乘法的较前方法的改进为约37%为两个处理器和单个处理器5.7%。我们的标量乘法是适用于智能卡实现。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号