POINT MULTIPLICATION ON SUPERSINGULAR ELLIPTIC CURVES DEFINED OVER FIELDS OF CHARACTERISTIC 2 AND 3

Kwang Ho Kim, Christophe Negre

2008

Abstract

Elliptic curve cryptosystem protocols use two main operations, the scalar multiplication and the pairing computation. Both of them are done through a chain of basic operation on the curve. In this paper we present new formulas for supersingular elliptic curve in characteristic 2 and 3. We improve best known formulas by at least one multiplication in the field.

References

  1. Ahmadi, O., Hankerson, D., , and Menezes, A. (2007). Software implementation of arithmetic in GF(3n). In WAIFI 2007.
  2. Baretto, P. S. L. M., Kim, H. Y., Lynn, B., and Scott, M. (2002). Efficient algorithms for pairing based cryptosystems. In CRYPTO'2002, volume 2442, pages 354-368.
  3. Galbraith, S. D. (2001). Supersingular curves in cryptography. Lecture Notes in Computer Science, 2248.
  4. Hankerson, D., Menezes, A., and Vanstone, S. (2004). Guide to Elliptic Curve Cryptography. SpringerVerlag.
  5. Harrison, K., Page, D., and Smart, N. P. (2002). Software implementation of finite fields of characteristic three, for use in pairing-based cryptosystems. LMS J. Comput. Math., 5:181-193.
  6. Koblitz, N. (1998). An elliptic curve implementation of the finite field digital signature algorithm. In CRYPTO'98, volume 1462, pages 327-337.
  7. Lopez, J. and Dahab, R. (1998). Improved algorithms for elliptic curve arithmetic in GF(2n). In SAC'98, pages 201-212.
  8. Page, D. and Smart, N. P. (2002). Hardware implementation of finite fields of characteristic three. In 4th CHES'2002, volume 2523 of LNCS, pages 529-539. Springer.
  9. Scott, M., Costigan, N., and Abdulwahab, W. (2006). Implementing cryptographic pairings on smartcards. In CHES 2006, volume 4249, pages 134-147.
Download


Paper Citation


in Harvard Style

Ho Kim K. and Negre C. (2008). POINT MULTIPLICATION ON SUPERSINGULAR ELLIPTIC CURVES DEFINED OVER FIELDS OF CHARACTERISTIC 2 AND 3 . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008) ISBN 978-989-8111-59-3, pages 373-376. DOI: 10.5220/0001926103730376


in Bibtex Style

@conference{secrypt08,
author={Kwang Ho Kim and Christophe Negre},
title={POINT MULTIPLICATION ON SUPERSINGULAR ELLIPTIC CURVES DEFINED OVER FIELDS OF CHARACTERISTIC 2 AND 3},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)},
year={2008},
pages={373-376},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001926103730376},
isbn={978-989-8111-59-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)
TI - POINT MULTIPLICATION ON SUPERSINGULAR ELLIPTIC CURVES DEFINED OVER FIELDS OF CHARACTERISTIC 2 AND 3
SN - 978-989-8111-59-3
AU - Ho Kim K.
AU - Negre C.
PY - 2008
SP - 373
EP - 376
DO - 10.5220/0001926103730376