Faster compact Diffie-Hellman: Endomorphisms on the x-line

Loading...
Publication Logo

Date

2014

Authors

Craig Costello
Hüseyin Hişil
Benjamin A. Smith

Journal Title

Journal ISSN

Volume Title

Publisher

Springer Verlag service@springer.de

Open Access Color

BRONZE

Green Open Access

Yes

OpenAIRE Downloads

OpenAIRE Views

Publicly Funded

No
Impulse
Top 10%
Influence
Top 10%
Popularity
Average

Research Projects

Journal Issue

Abstract

We describe an implementation of fast elliptic curve scalar multiplication optimized for Diffie-Hellman Key Exchange at the 128-bit security level. The algorithms are compact (using only x-coordinates) run in constant time with uniform execution patterns and do not distinguish between the curve and its quadratic twist, they thus have a built-in measure of side-channel resistance. (For comparison we also implement two faster but non-constant-time algorithms.) The core of our construction is a suite of two-dimensional differential addition chains driven by efficient endomorphism decompositions built on curves selected from a family of ℚ-curve reductions over double-struck F <inf>p2</inf> with p = 2127 - 1. We include state-of-the-art experimental results for twist-secure constant-time x-coordinate-only scalar multiplication. © 2014 International Association for Cryptologic Research. © 2014 Elsevier B.V. All rights reserved.

Description

Keywords

Addition Chains, Elliptic Curve Cryptography, Endomorphism, Kummer Variety, Montgomery Curve, Scalar Multiplication, Side Channel Attacks, Twist-secure, Chains, Public Key Cryptography, Addition Chains, Elliptic Curve Cryptography, Endomorphism, Kummer Variety, Montgomery, Scalar Multiplication, Side Channel Attack, Twist-secure, Algorithms, Chains, Public key cryptography, Addition chains, Elliptic curve cryptography, endomorphism, Kummer variety, Montgomery, Scalar multiplication, Side channel attack, twist-secure, Algorithms, addition chains, Montgomery curve, 510, Kummer variety, side channel attacks, Elliptic curve cryptography, scalar multiplication, endomorphism, twist-secure, [INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]

Fields of Science

0102 computer and information sciences, 02 engineering and technology, 01 natural sciences, 0202 electrical engineering, electronic engineering, information engineering

Citation

WoS Q

Scopus Q

OpenCitations Logo
OpenCitations Citation Count
20

Source

33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques EUROCRYPT 2014

Volume

Issue

Start Page

End Page

PlumX Metrics
Citations

CrossRef : 12

Scopus : 24

Captures

Mendeley Readers : 30

Google Scholar Logo
Google Scholar™
OpenAlex Logo
OpenAlex FWCI
10.0061

Sustainable Development Goals

SDG data is not available