Fast Cryptography in Genus 2
Loading...

Date
2016
Authors
Joppe W. Bos
Craig Costello
Hüseyin Hişil
Kristin Estella Lauter
Journal Title
Journal ISSN
Volume Title
Publisher
Springer New York LLC barbara.b.bertram@gsk.com
Open Access Color
BRONZE
Green Open Access
Yes
OpenAIRE Downloads
OpenAIRE Views
Publicly Funded
No
Abstract
In this paper we highlight the benefits of using genus 2 curves in public-key cryptography. Compared to the standardized genus 1 curves or elliptic curves arithmetic on genus 2 curves is typically more involved but allows us to work with moduli of half the size. We give a taxonomy of the best known techniques to realize genus 2-based cryptography which includes fast formulas on the Kummer surface and efficient four-dimensional GLV decompositions. By studying different modular arithmetic approaches on these curves we present a range of genus 2 implementations. On a single core of an Intel Core i7-3520M (Ivy Bridge) our implementation on the Kummer surface breaks the 125 thousand cycle barrier which sets a new software speed record at the 128-bit security level for constant-time scalar multiplications compared to all previous genus 1 and genus 2 implementations. © 2016 Elsevier B.V. All rights reserved.
Description
Keywords
Public Key Cryptography, Elliptic Curve, Genus 2 Curves, Intel Core I7, Kummer Surface, Modular Arithmetic, Scalar Multiplication, Security Level, Cryptography, Public key cryptography, Elliptic curve, Genus 2 curves, Intel core i7, Kummer surface, Modular arithmetic, Scalar multiplication, Security level, Cryptography, Cryptography, 500, Applications to coding theory and cryptography of arithmetic geometry, 510
Fields of Science
0101 mathematics, 01 natural sciences
Citation
WoS Q
Scopus Q

OpenCitations Citation Count
7
Source
Journal of Cryptology
Volume
29
Issue
Start Page
28
End Page
60
Collections
PlumX Metrics
Citations
CrossRef : 2
Scopus : 10
Captures
Mendeley Readers : 30
Google Scholar™


