using three processors will reduce the execution time
more, especially in performing the addition operati-
ons.
REFERENCES
Anagreh, M., Samsudin, A., and Omar, M. (2014). Paral-
lel method for computing elliptic curve scalar mul-
tiplication based on mof. Int. Arab J. Inf. Technol,
11(6):521–525.
Ansari, B. and Wu, H. (2005). Parallel scalar multiplication
for elliptic curve cryptosystems. In Proceedings of In-
ternational Conference on Communications, Circuits
and Systems, vol. 1, pages 71–73.
Asif, A. and Kong, Y. (2017). Highly parallel modular mul-
tiplier for elliptic curve cryptography in residue num-
ber system. Circuits, Systems, and Signal Processing,
36(3):1027–1051.
Azarderakhsh, R. and Reyhani-Masoleh, A. (2015). Pa-
rallel and high-speed computations of elliptic curve
cryptography using hybrid-double multipliers. IEEE
Transactions on Parallel and Distributed Systems,
26(6):1668–1677.
Balasubramaniam, P. and Kathikeyan, E. (2007). Ellptic
curve scalar multiplication algorithm using comple-
mentary recoding. Applied mathematics and compu-
tation, 190(1):51–56.
Booth, A. (1951). A signed binary multiplication technique.
Journal of Applied Mathematics, 4:236–240.
Chang, C., Kuo, Y., and Lin, C. (2003). Fast algorithms for
common-multiplicand multiplication and exponentia-
tion by performing complements. In Advanced In-
formation Networking and Applications, 2003. AINA
2003. 17th International Conference on, pages 807–
811. IEEE.
Chung, S., Lee, J., chang, C., and Lee, C. (2012). A
high-performance elliptic curve cryptographic proces-
sor over gf(p) with spa resistance. In Circuits and Sy-
stems (ISCAS), 2012 IEEE International Symposium
on, pages 1456–1459.
Gura, N., Patel, A., Wander, A., Eberle, H., and Shantz, S.
(2004). Comparing elliptic curve cryptography and
rsa on 8-bit cpus. In Proceedings of the International
workshop on cryptographic hardware and embedded
systems, pages 119–132. Springer.
Gutub, A. and Arabia, S. (2010). Remodeling of elliptic
curve cryptography scalar multiplication architecture
using parallel jacobian coordinate system. Internati-
onal Journal of Computer Science and Security (IJ-
CSS), 4(4):409–ff.
Huang, X., Shah, G., and Sharma, D. (2010). Minimizing
hamming weight based on 1’s complement of binary
numbers over gf (2 m). In Advanced Communica-
tion Technology (ICACT), 2010 The 12th Internatio-
nal Conference on, pages 1226–1230.
Koblitz, N. (1987). Elliptic curve cryptosystems. Mathe-
matics of computation, 48(177):203–209.
Liu, Z., Seo, H., Großsch
¨
adl, J., and Kim, H. (2016). Ef-
ficient implementation of nist-compliant elliptic curve
cryptography for 8-bit avr-based sensor nodes. IEEE
Transactions on Information Forensics and Security,
11(7):1385–1397.
Miller, V. (1986). Use of elliptic curves in cryptography. In
Advances in Cryptology, Proceedings of CRYPTO85
(LNCS 218), pages 417–426. Springer.
Negre, C. and Robert, M. (2015). Parallel approaches for
efficient scalar multiplication over elliptic curve. In
SECRYPT: International Conference on Security and
Cryptography, pages 202–209.
Nichols, R. K. (1998). Biometric Encryption, chapter 22.
McGraw-Hill.
Okeya, K., Schmidt-Samoa, K., Spahn, C., and Takagi, T.
(2004). Signed binary representations revisited. In An-
nual International Cryptology Conference, CRYPTO
2004, pages 123–139. Springer.
Pabbulti, K., Mane, H., Desai, A., Albert, C., and
Schaumont, P. (2013). Simd acceleration of modu-
lar arithmetic on contemporary embedded platforms.
In High Performance Extreme Computing Conference
(HPEC), pages 1–6. IEEE.
Pathak, K. and Sanghi, A. (2010). Speeding up computation
of scalar multiplication in elliptic curve cryptosystem.
International Journal on Computer Science and Engi-
neering, 2(4):236–240.
Phalakarn, K., Phalakarn, K., and Suppaktpaisarn, V.
(2018). Optimal representation for right-to-left paral-
lel scalar and multi-scalar point multiplication. In-
ternational Journal of Networking and Computing,
8(2):166–185.
Reitwiesner, G. (1960). Binary arithmetic. Advances in
Computers, 1:231–308.
Rivest, R., Shamir, A., and Adleman, L. (1978). A method
for obtaining digital signatures and public-key cryp-
tosystems. Communications of the ACM, 21(2):120–
126.
Robert, M. (2014). Parallelized software implementation of
elliptic curve scalar multiplication. In International
Conference on Information Security and Cryptology,
pages 445–462. Springer.
Solinas, J. (2001). Low-weight binary representations for
pairs of integers. Technical Report CORR 2001-41,
Center for Applied Cryptographic Research, Univer-
sity of Waterloo.
Stallings, W. (2005). Cryptography and Network Security
Principles and Practices. Prentice Hall, 4th edition.
Accelerate Performance for Elliptic Curve Scalar Multiplication based on NAF by Parallel Computing
245