Faster Compact Diffie-Hellman: Endomorphisms on the x-line
Loading...

Date
2014
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
SPRINGER-VERLAG BERLIN
Open Access Color
BRONZE
Green Open Access
Yes
OpenAIRE Downloads
OpenAIRE Views
Publicly Funded
No
Abstract
We describe an implementation of fast elliptic curve scalar multiplication optimized for Diffie-Hellman Key Exchange at the 128-bit security level. The algorithms are compact (using only x-coordinates) run in constant time with uniform execution patterns and do not distinguish between the curve and its quadratic twist, they thus have a built-in measure of side-channel resistance. (For comparison we also implement two faster but non-constant-time algorithms.) The core of our construction is a suite of two-dimensional differential addition chains driven by efficient endomorphism decompositions built on curves selected from a family of Q-curve reductions over F-p2 with p = 2(127) - 1. We include state-of-the-art experimental results for twist-secure constant-time x-coordinate-only scalar multiplication.
Description
Keywords
Elliptic curve cryptography, scalar multiplication, twist-secure, side channel attacks, endomorphism, Kummer variety, addition chains, Montgomery curve, ELLIPTIC CURVE, IMPROVED ALGORITHM, LOGARITHMS, Endomorphism, Kummer Variety, Montgomery Curve, Side Channel Attacks, Scalar Multiplication, Twist-secure, Addition Chains, Elliptic Curve Cryptography, addition chains, Montgomery curve, 510, Kummer variety, side channel attacks, Elliptic curve cryptography, scalar multiplication, endomorphism, twist-secure, [INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
Fields of Science
0102 computer and information sciences, 02 engineering and technology, 01 natural sciences, 0202 electrical engineering, electronic engineering, information engineering
Citation
WoS Q
Scopus Q

OpenCitations Citation Count
20
Source
33rd Annual International-Association-for-Cryptologic-Research Eurocrypt Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT)
Volume
8441
Issue
Start Page
183
End Page
200
PlumX Metrics
Citations
CrossRef : 12
Scopus : 24
Captures
Mendeley Readers : 30
Google Scholar™


