An RNS Implementation of an $F_{p}$ Elliptic Curve Point Multiplier
Citations
123 citations
111 citations
Cites background or methods from "An RNS Implementation of an $F_{p}$..."
...38 IEEE cIrcuIts and systEms magazInE fourth QuartEr 2015 multiplications using less than half the areas of other previous design efforts [77]....
[...]
...Any speedup on point multiplication will result in a noteworthy improvement in ECC’s performance....
[...]
...tation of modular multiplication and modular exponentiation in Rivest, Shamir and Adleman (RSA) [76] and Elliptic Curve Cryptography (ECC) [77] algorithms....
[...]
...On the other hand, the most important and computationally intensive arithmetic operation of ECC is point multiplication....
[...]
...RNS is useful in speeding up the hardware implementation of modular multiplication and modular exponentiation in Rivest, Shamir and Adleman (RSA) [76] and Elliptic Curve Cryptography (ECC) [77] algorithms....
[...]
85 citations
Cites background or methods from "An RNS Implementation of an $F_{p}$..."
...The field characteristic is p = 2160 + 7 for a 160-b implementation and NIST recommendations for p − 192, p− 224, and p− 256 corresponding to 2192− 264 − 1, 2224 − 296 + 1, and 2256 − 2224 + 2192 + 296 − 1, respectively [4]....
[...]
...One way to speed up the elliptic curve point multiplication (ECPM) is through the residue number system (RNS) representation [4]....
[...]
...In this brief, a new architecture for ECPM was presented, based on efficient RNS bases....
[...]
...The required operations for point addition and doubling are detailed in [4]....
[...]
...Among various ECC implementations [4]–[8], RNS has been recently exploited for ECPM [4], [8]....
[...]
61 citations
Cites background from "An RNS Implementation of an $F_{p}$..."
...Among the existing works, the designs in [2] and [3] support only NIST primes [53]....
[...]
59 citations
References
5,378 citations
"An RNS Implementation of an $F_{p}$..." refers background in this paper
...I. INTRODUCTION E LLIPTIC curve cryptography (ECC), presented byKoblitz [1] and Miller [2] independently in 1985, has withstood a large number of attacks and has evolved significantly, so that it is considered a mature public-key cryptosystem....
[...]
...E LLIPTIC curve cryptography (ECC), presented by Koblitz [1] and Miller [2] independently in 1985, has withstood a large number of attacks and has evolved significantly, so that it is considered a mature public-key cryptosystem....
[...]
4,004 citations
2,893 citations
2,647 citations
2,311 citations
"An RNS Implementation of an $F_{p}$..." refers background in this paper
...Many abstract models for representing the behavior of an algorithm at the architectural level have been proposed in the technical literature [12]....
[...]