Abstract
In this paper we introduce new methods for computing constant-time variable-base point multiplications over the Galbraith-Lin-Scott (GLS) and the Koblitz families of elliptic curves. Using a left-to-right double-and-add and a right-to-left halve-and-add Montgomery ladder over a GLS curve, we present some of the fastest timings yet reported in the literature for point multiplication. In addition, we combine these two procedures to compute a multi-core protected scalar multiplication. Furthermore, we designed a novel regular \(\tau \)-adic scalar expansion for Koblitz curves. As a result, using the regular recoding approach, we set the speed record for a single-core constant-time point multiplication on standardized binary elliptic curves at the \(128\)-bit security level.
J. López — The author was supported in part by the Intel Labs University Research Office.
You have full access to this open access chapter, Download conference paper PDF
Similar content being viewed by others
Keywords
1 Introduction
From a cryptographic perspective, one of the most interesting consequences of the Snowden revelations is the increased awareness about the importance of implementing security protocols that offer the Perfect Forward Secrecy (PFS) property. The PFS property guarantees that in a given protocol, none of its past short term session keys can be derived from the long term server’s private key. One tangible example of this situation is the recent announcement by the Internet Engineering Task Force that the Transport Layer Security (TLS) protocol version 1.3, will no longer include cipher suites based on RSA key transport primitives [34]. Instead, the client-server secret key establishment will be performed via either the Ephemeral Diffie-Hellman or the Elliptic Curve Ephemeral Diffie-Hellman (ECDHE) methods. Because of the significant performance advantage of the latter over the former, it is anticipated that in the years to come, ECDHE will be the favorite choice for establishing a TLS shared secret.
The specifications of all the TLS protocol versions [8–10] include support for prime and binary field elliptic curve cryptographic primitives. In the case of binary elliptic curves, the TLS protocol supports a selection of several standardized random curves as well as Koblitz curves [23] at the \(80\)-, \(128\)-, \(192\)- and \(256\)-bit security levels. Koblitz curves allow performance improvements, due to the availability of the Frobenius automorphism \(\tau \). Also, their generation is inherently rigid (in the SafeCurves sense [2]), where the only degree of freedom in the curve generation process consists in choosing a suitable prime degree extension \(m\) that produces a curve with almost-prime order. This severely limits the possibility of “1-in-a-million attacks” [35] aiming to reach a weak curve after testing many random seeds.
Point multiplication is the single most important operation of (hyper) elliptic curve cryptography, for that reason, considerable effort has been directed towards achieving fast and compact software/hardware implementations of it. A major result that has influenced the latest implementations was found in 2009, when Galbraith, Lin and Scott (GLS), building on a previous technique introduced by Gallant, Lambert and Vanstone (GLV) [14], constructed efficient endomorphisms for a class of elliptic curves defined over the quadratic field \(\mathbb {F}_{q^2}\), where \(q\) is a prime number [13]. Taking advantage of this result, the authors of [13] performed a 128-bit security level point multiplication that took \(326{,}000\) clock cycles on a \(64\)-bit processor. Since then, a steady stream of algorithmic and technological advances has translated into a significant reduction in the number of clock cycles required to compute a (hyper) elliptic curve constant-time variable-base-point multiplication at the 128-bit security level [1, 4, 5, 11, 16, 24, 38].
The authors of [11, 24] targeted a twisted Edwards GLV-GLS curve defined over \({\mathbb {F}}_{p^2},\) with \(p = 2^{127}-5997.\) That curve is equipped with a degree-4 endomorphism allowing a fast point multiplication computation that required just \(92{,}000\) clock cycles on an Ivy Bridge processor [11]. Bos et al. [5] and Bernstein et al. [1], presented an efficient point multiplication on the Kummer surface associated with the Jacobian of a genus 2 curve defined over a field generated by the prime \(p = 2^{127}-1\). Each iteration of the Montgomery ladder presented in [1] costs roughly 25 field multiplications, which implemented on a Haswell processor permits to compute a point multiplication in \(72{,}000\) clock cycles.
In 2014, Oliveira et al. introduced the \(\lambda \)-projective coordinate system that leads to faster binary field elliptic curve arithmetic [31, 32]. The authors applied that coordinate system into a binary GLS curve that admits a degree-2 endomorphism and a fast field arithmetic associated with the quadratic field extension of the binary field \({\mathbb {F}}_{2^{127}}.\) When implemented on a Haswell processor, this approach permits to perform one constant-time point multiplication computation in just \(60{,}000\) clock cycles.
Contributions of This Paper. This work presents new methods aimed to perform fast constant-time variable-base-point multiplication computation for both random and Koblitz binary elliptic curves of the form \(y^2 + xy = x^3 +ax^2 + b.\) In the case of random binary elliptic curves, we introduce a novel right-to-left variant of the classical Montgomery-López-Dahab ladder algorithm presented in [25], which efficiently adapted the original ladder idea introduced by Peter Montgomery in his 1987 landmark paper [26]. The new variant presented in this work does not require point doublings, but instead, it uses the efficient point halving operation available on binary elliptic curves. In contrast with the algorithm presented in [25] that does not admit the benefit of precomputed tables, our proposed variant can take advantage of this technique, a feature that could be proved valuable for the fixed-base-point multiplication scenario. Moreover, we show that our new right-to-left Montgomery ladder formulation can be nicely combined with the classical ladder to attain a high parallel acceleration factor for a constant-time multi-core implementation of the point multiplication operation. As a second contribution, we present a procedure that adapts the regular scalar recoding of [21] to the task of producing a regular \(\tau \)-NAF scalar recoding for Koblitz curves. This approach has faster precomputation than related recodings [30] and allows us to achieve a speed record for single-core constant-time point multiplication on standardized binary elliptic curves at the \(128\)-bit security level.
The remainder of this paper is organized as follows. In Sect. 2 we give a short description of the GLS and Koblitz curves, their arithmetic and their security. In Sect. 3 we present new variants of the Montgomery ladder for binary elliptic curves. Then, in Sect. 4, we introduce a regular \(\tau \)-NAF recoding amenable for producing protected point multiplication implementations on Koblitz curves. In Sect. 5, we present our experimental implementation results and finally, we draw our conclusions in Sect. 6.
2 Mathematical Background
2.1 Quadratic Field Arithmetic
A binary extension field \({\mathbb {F}}_{q},\) \(q=2^m,\) can be constructed by taking an degree-\(m\) polynomial \(f(x) \in {\mathbb {F}}_{2}[x]\) irreducible over \({\mathbb {F}}_{2},\) where the field elements in \({\mathbb {F}}_q\) are the set of binary polynomials of degree less than \(m\). Quadratic extensions of a binary extension field can be built using a degree two monic polynomial \(g(u) \in {\mathbb {F}}_{q}[u]\) irreducible over \({\mathbb {F}}_{q}\). In this case, the field \({\mathbb {F}}_{q^{2}}\) is isomorphic to \({\mathbb {F}}_{q}[u]/(g(u))\) and its elements can be represented as \(a_0 + a_1u\), with \(a_0, a_1 \in \mathbb {F}_{q}\). Operations in the quadratic extension are performed coefficient-wise. For instance, the multiplication of two elements \(a,b\in {\mathbb {F}}_{q^{2}}\) is computed at the cost of three multiplications in the base field using the customary Karatsuba formulation,
with \(a_0, a_1, b_0, b_1 \in {\mathbb {F}}_q\).
In [31, 32], the authors developed an efficient software library for the field \({\mathbb {F}}_{2^m}\) and its quadratic extension \({\mathbb {F}}_{2^{2m}},\) with \(m=127,\) generated by means of the irreducible trinomials \(f(x) = x^{127} + x^{63} + 1\) and \(g(u) = u^2 + u +1\), respectively. The computational cost of the field arithmetic in the quadratic extension field gets significantly reduced by using that towering approach. To be more concrete, let \(M\) and \(m\) denote the cost of one field multiplication over \({\mathbb {F}}_{q^2}\) and \({\mathbb {F}}_{q},\) respectively. The execution of the arithmetic library of [32] on the Sandy Bridge and Haswell microprocessors yields a ratio \(M/m\) of just 2.23 and 1.51, respectively. These experimental results are considerably better than the theoretical ratio \(M/m = 3\) that one could expect from the Karatsuba formulation of Eq. (1). The aforementioned performance speedup can be explained from the fact that the towering field approach permits a much better usage of the processor’s pipelined execution unit, which potentially can improve the speed of one 64-bit carry-less multiplicationFootnote 1 from \(7\) clock cycles to the maximum achievable throughput of just \(2\) clock cycles [12].
2.2 GLS Binary Elliptic Curves
Let \(E_{a,b}({\mathbb {F}}_{q^2})\) denote the additive abelian group formed by the point at infinity \(\mathcal {O}\) and the set of affine points \(P = (x, y)\) with \(x, y \in \mathbb {F}_{q^2}\) that satisfy the ordinary binary elliptic curve equation given as,
defined over \(\mathbb {F}_{q^2=2^{2m}},\) with \(a \in {\mathbb {F}}_{q^2}\) and \(b \in {\mathbb {F}}_{q^2}^*.\) Let \(\#E_{a,b}({\mathbb {F}}_{q^2})\) denote the size of the group \(E_{a,b}({\mathbb {F}}_{q^2}),\) and let us assume that \(E_{a,b}({\mathbb {F}}_{q^2})\) includes a subgroup \(\langle P\rangle \) of prime order \(r.\)
The point multiplication operation, denoted by \(Q=kP\), corresponds to adding \(P\) to itself \(k-1\) times, with \(k\in [0, r-1]\). The average cost of computing \(kP\) by a random \(n\)-bit scalar \(k\) using the traditional double-and-add method is about \(n D + \frac{n}{2}A\), where \(D\) and \(A\) are the cost of doubling and adding a point, respectively. If the elliptic curve \(E\) of Eq. (2) is equipped with a non-trivial efficiently computable endomorphism \(\psi \) such that \(\psi (P) = \delta P\in \langle P\rangle ,\) for some \(\delta \in [2, r-2].\) Then the point multiplication can be computed à la GLV as,
where the subscalars \(|k_1|, |k_2| \approx n/2,\) can be found by solving a closest vector problem in a lattice [13]. Having split the scalar \(k\) into two parts, the computation of \(kP = k_1P + k_2\psi (P)\) can be performed by applying simultaneous multiple point multiplication techniques [18] that translates into a saving of half of the doublings required by the execution of a single point multiplication \(kP\).
Inspired by the GLS technique of [13], Hankerson, Karabina and Menezes presented in [17] a family of binary GLS curves defined over the field \(\mathbb {F}_{q^{2}},\) with \(q=2^m,\) which admits a two-dimensional endomorphism. This endomorphism can be computed at the inexpensive cost of just three additions in \({\mathbb {F}}_q\). Furthermore, by carefully choosing the elliptic curve parameters \(a,b\) of Eq. (2), the authors of [17] showed that it is possible to find members of that family of GLS curves with an almost-prime group order of the form \(\#E_{a,b}({\mathbb {F}}_{q^{2}}) = hr\), with \(h=2\) and where \(r\) is a \((2m-1)\)-bit prime number.
Security of GLS Curves. Given a point \(Q\in \langle P\rangle \), the Elliptic Curve Discrete Logarithm Problem (ECDLP) consists of finding the unique integer \(k \in [0, r-1]\) such that \(Q = kP.\) To the best of our knowledge, the most powerful attack for solving the ECDLP on binary elliptic curves was presented in [33] (see also [20, 36]), with an associated computational complexity of \(O(2^{c\cdot m^{2/3}\log m}),\) where \(c<2,\) and where \(m\) is a prime number. This is worse than generic algorithms with time complexity \(O(2^{m/2})\) for all prime field extensions \(m\) less than \(N = 2000,\) a bound that is well above the range used for performing elliptic curve cryptography [33]. On the other hand, since the elliptic curve of Eq. (2) is defined over a quadratic extension of the field \({\mathbb {F}}_q,\) the generalized Gaudry-Hess-Smart (gGHS) attack [15, 19] to solve the ECDLP on the curve \(E,\) applies. To prevent this attack, it suffices to verify that the constant \(b\) of \({E}_{a, b}({\mathbb {F}}_{q^2})\) is not weak. Nevertheless, the probability that a randomly selected \(b \in {\mathbb {F}}_{q}^*\) is a weak parameter, is negligibly small [17].
2.3 Koblitz Curves
A Koblitz curve, also known as an anomalous binary curve or subfield curve, is defined as the set of affine points \(P = (x, y) \in {\mathbb {F}}_{q} \times {\mathbb {F}}_{q},\) \(q = 2^m\), that satisfy the Weierstraß equation \(E_a:y^2+xy = x^3 + ax^2+1,\) \(a\in \{0,1\},\) together with a point at infinity denoted by \(\mathcal {O}\). In \(\lambda \)-affine coordinates, where the points are represented as \(P=(x, \lambda = x+\frac{y}{x}),\) \(x\ne 0\), the \(\lambda \)-affine form of the above equation becomes [32], \((\lambda ^2 + \lambda + a)x^2 = x^4 + 1.\) A Koblitz curve forms an abelian group denoted as \(E_a({\mathbb {F}}_{2^m})\) of order \(2(2 - a)r\), for an odd prime \(r\), where its group law is defined by the point addition operation.
Frobenius Map. Since their introduction in [23], Koblitz curves were extensively studied for their additional structure that allows, in principle, a performance speedup in the point multiplication computation. The Frobenius map \(\tau : E_a({\mathbb {F}}_{q}) \rightarrow E_a({\mathbb {F}}_{q})\) defined by \(\tau (\mathcal {O}) = \mathcal {O},\) \(\tau (x,y) = (x^2,y^2),\) is a curve automorphism satisfying \((\tau ^2 + 2)P = \mu \tau (P)\) for \(\mu =(-1)^{1-a}\) and all \(P \in E_a({\mathbb {F}}_{q})\). By solving the equation \(\tau ^2+2 = \mu \tau \), the Frobenius map can be seen as the complex number \(\tau =\frac{\mu +\sqrt{-7}}{2}\). Notice that in \(\lambda \)-coordinates the Frobenius map action remains the same, because, \(\tau (x,\lambda ) = (x^2,\lambda ^2) = (x^2,x^2 + \frac{y^2}{x^2}),\) which corresponds to the \(\lambda \)-representation of \(\tau (x,y)\). Let \({\mathbb {Z}}[\tau ]\) be the ring of polynomials in \(\tau \) with coefficients in \({\mathbb {Z}}\). Since the Frobenius map is highly efficient, as long as it is possible to convert an integer scalar \(k\) to its \(\tau \)-representation \(k = \sum _{i=0}^{l-1}u_i\tau ^i\), its action can be exploited in a point multiplication computation by adding multiples \(u_i\tau ^i(P)\), with \(u_i\tau ^i \in {\mathbb {Z}}[\tau ]\). Solinas [37] proposed exactly that, namely, a \(\tau \)-adic scalar recoding analogous to the signed digit scalar Non-Adjacent Form representation.
Security of Koblitz Curves. From the security point of view, it has been argued that the availability of additional structure in the form of endomorphisms can be a potential threat to the hardness of elliptic curve discrete logarithms [3], but limitations observed in approaches based on isogeny walks is evidence contrariwise [22]. Furthermore, the generation of Koblitz curves satisfy by definition the rigidity property. Constant-time compact implementations for Koblitz curves are also easily obtained by specializing the Montgomery-López-Dahab ladder algorithm [25] for \(b=1\), although we show below that this is not the most efficient constant-time implementation strategy possible. Another practical advantage is the adoption of Koblitz curves by several standards bodies [27], which guarantee interoperability and availability of implementations in many hardware and software platforms.
3 New Montgomery Ladder Variants
This Section presents algorithms for computing the scalar multiplication through the Montgomery ladder method. Here, we let \(P\) be a point in a binary elliptic curve of prime order \(r>2\) and \(k\) a scalar of bit length \(n\). Our objective is to compute \(Q = kP\).
Algorithm 1 describes the classical left-to-right Montgomery ladder approach for point multiplication [26], whose key algorithmic idea is based on the following observation. Given a base point \(P\) and two input points \(R_0\) and \(R_1,\) such that their difference, \(R_0-R_1 = P,\) is known, the \(x\)-coordinates of the points, \(2R_0,\) \(2R_1\) and \(R_0+R_1,\) are fully determined by the \(x\)-coordinates of \(P,\) \(R_0\) and \(R_1\).
More than one decade after its original proposal in [26], López and Dahab presented in [25] an optimized version of the Montgomery ladder, which was specifically crafted for the efficient computation of point multiplication on ordinary binary elliptic curves. In this scenario, compact formulae for the point addition and point doubling operations of Algorithm 1 can be derived from the following result.
Lemma 1
[25]. Let \(P=(x, y),\) \(R_1 = (x_1, y_1),\) and \(R_0 = (x_0, y_0)\) be elliptic curve points, and assume that \(R_1-R_0 = P,\) and \(x_0 \ne 0.\) Then, the \(x\)-coordinate of the point \((R_0+R_1)\), \(x_3,\) can be computed in terms of \(x_0,\) \(x_1,\) and \(x\) as follows,
Moreover, the \(y\)-coordinate of \(R_0\) can be expressed in terms of \(P,\) and the \(x\)-coordinates of \(R_0,\) \(R_1\) as,
Let us denote the projective representation of the points \(R_0,\) \(R_1\) and \(R_0 + R_1,\) without considering their \(y\)-coordinates as, \(R_0 = (X_0, -, Z_0)\), \(R_1 = (X_1,-, Z_1)\) and \(R_0 + R_1 = (X_3, -, Z_3).\) Then, for the case \(R_0 = R_1,\) Lemma 1 implies,
Furthermore, for the case \(R_0 \ne \pm R_1,\) one has that,
From Eqs. (5) and (6) it follows that the computational cost of each ladder step in Algorithm 1 is of \(5\) multiplications, \(1\) multiplication by the curve \(b\)-constant, \(4\) or \(5\) squaringsFootnote 2 and \(3\) additions over the binary extension field where the elliptic curve has been defined.
In the rest of this Section, we will present a novel right-to-left formulation of the classical Montgomery ladder.
3.1 Right-to-Left Double-and-Add Montgomery-LD Ladder
Algorithm 2 presents a right-to-left version of the classical Montgomery ladder procedure. At the end of the \(i\)-th iteration, the points in the variables \(R_0, R_1\) are, \(R_0 = 2^{i+1}P,\) and \(R_1 = \ell P + \frac{P}{2},\) where \(\ell \) is the integer represented by the \(i\) rightmost bits of the scalar \(k\). The variable \(R_2\) maintains the relationship, \(R_2 = R_0-R_1\) from the initialization (step 1), until the execution of the last iteration of the main loop (steps 2–9). This comes from the fact that at each iteration, if \(k_i = 1,\) then the difference \(R_0-R_1\) remains unchanged. If otherwise, \(k_i = 0,\) then both \(R_2\) and \(R_0\) are updated with their respective original values plus \(R_0,\) which ensures that \(R_2 = R_0-R_1,\) still holds. Notice however that, although the difference \(R_2 = R_0-R_1,\) is known, it may vary throughout the iterations.
As stated in Lemma 1, the point additions of steps 4 and 6 in Algorithm 2 can be computed using the \(x\)-coordinates of the points \(R_0, R_1\) and \(R_2,\) according to the following analysis. If \(k_i = 1\), then the \(x\)-coordinate of \(R_0 + R_1\) is a function of the \(x\)-coordinates of \(R_0\), \(R_1\) and \(R_2\), because \(R_2 = R_0 - R_1\). If \(k_i = 0\), the \(x\)-coordinate of \(R_2 + R_0\) is a function of the \(x\)-coordinates of the points \(R_0\), \(R_1\) and \(R_2\), because \(R_0 - R_2 = R_0 - (R_0 - R_1) = R_1\). Hence, considering the projective representation of the points \(R_0 = (X_0, -, Z_0)\), \(R_1 = (X_1, -, Z_1)\), \(R_2 = (X_2, -, Z_2)\) and \(R_0 + R_1 = (X_3, -, Z_3),\) where all the \(y\)-coordinates are ignored, and assuming \(R_0 \ne \pm R_1,\) we have,
From Eqs. (5) and (7), it follows that the computational cost of each ladder step in Algorithm 2 is of \(7\) multiplications, \(1\) multiplication by the curve \(b\)-constant, \(4\) or \(5\) squarings and \(3\) additions over the binary field where the elliptic curve lies.
Although conceptually simple, the above method has several algorithmic and practical shortcomings. The most important one is the difficulty to recover, at the end of the algorithm, the \(y\)-coordinate of \(R_1\), as in none of the available points (\(R_0\), \(R_1\) and \(R_2\)) the corresponding \(y\)-coordinate is known. This may force the decision to use complete projective formulae for the point addition and doubling operations of steps \(4\), \(6\) and \(8\), which would be costly. Finally, we stress that to guarantee that the case \(R_0 = R_2\) will never occur, it is sufficient to initialize \(R_1\) with \(\frac{P}{2},\) and perform an affine subtraction at the end of the main loop (step 10).
In the following subsection we present a halve-and-add right-to-left Montgomery ladder algorithm that alleviates the above shortcomings and still achieves a competitive performance.
3.2 Right-to-Left Halve-and-Add Montgomery-LD Ladder
Algorithm 3 presents a right-to-left Montgomery ladder procedure similar to Algorithm 2, but in this case, all the point doubling operations are substituted with point halvings. A left-to-right approach using halve-and-add with Montgomery ladder was published in [29], however, this method requires one inversion per iteration, which degrades its efficiency due to the cost of this operation.
As in any halve-and-add procedure, an initial step before performing the actual computation consists of processing the scalar \(k\) such that it can be equivalently represented with negative powers of two. To this end, one first computes \(k' \equiv 2^{n-1} k \;\mathrm{mod}\;r,\) with \(n = \vert r\vert \). This implies that, \(k \equiv \sum _{i=1}^{n} k'_{n-i}/2^{i-1} \;\mathrm{mod}\;r\) and therefore, \(kP =\sum _{i=1}^{n} k'_{n-i} (\frac{1}{2^{i-1}}P).\) Then, in the first step of Algorithm 3, \(n\) halvings of the base point \(P\) are computed. We stress that all the precomputed points \(P_i = \frac{P}{2^i},\) for \(i = 0,\ldots , n\) can be stored in affine coordinates. In fact, just the \(x\)-coordinate of each one of the above \(n\) points must be stored (with the sole exception of the point \(P_{n}\), whose \(y\)-coordinate is also computed and stored).
As in the preceding algorithm notice that at the end of the \(i\)-th iteration, the points in the variables \(R_0, R_1\) are, \(R_0 = \frac{P}{2^{n-i-1}},\) and \(R_1 = \ell P + P_n,\) where in this case \(\ell \) is the integer represented as, \(\ell = \sum \limits _{j = 0}^{i} \frac{k'_{j}}{2^{n-j}} \;\mathrm{mod}\;r\). Notice also that the variable \(R_2\) maintains the relationship, \(R_2 = R_0-R_1\), until the execution of the last iteration of the main loop (steps 3–10). This comes from the fact that at each iteration, if \(k_i = 1,\) then the difference \(R_0-R_1\) remains unchanged. If otherwise, \(k_i = 0,\) then both \(R_2\) and \(R_0\) are updated with their respective original values plus \(R_0,\) which ensures that \(R_2 = R_0-R_1,\) still holds.
Since at every iteration, the values of the points \(R_0,\) \(R_1\) and \(R_0-R_1,\) are all known, the compact point addition formula (7) can be used. In practice, this is also possible because the \(y\)-coordinate of the output point \(kP\) can be readily recovered using Eq. 4, along with the point \(2P\). Moreover, since the points in the precomputed table were generated using affine coordinates, it turns out that the \(z\)-coordinate of the point \(R_0\) is always 1 for all the iterations of the main loop. This simplifies (7) as,
Hence, the computational cost per iteration of Algorithm 3 is of \(5\) multiplications, \(1\) squaring, \(2\) additions and one point halving over the binary field where the elliptic curve lies.
GLS Endomorphism. The efficient computable endomorphism provided by the GLS curves can be used to implement the 2-GLV method on the Algorithm 3. As a result, only \(n/2\) point halving operations must be computed. Besides the speed improvement, the 2-GLV method reduces to a half the number of precomputed points that must be stored.
3.3 Multi-core Montgomery Ladder
As proposed in [38], by properly recoding the scalar, one can efficiently compute the scalar multiplication in a multi-core environment. Specifically, given a scalar \(k\) of size \(n\), we fix a constant \(t\) which establishes how many scalar bits will be processed by the double-and-add, and by the halve-and-add procedures. This is accomplished by computing, \(k' = 2^tk \;\mathrm{mod}\;r,\) which yields,
In a two-core setting, it is straightforward to combine the left-to-right and right-to-left Montgomery ladder procedures of Algorithms 2 and 3, and distribute them to both cores. In this scenario, the number of necessary pre-computed halved points reduces to \({\sim }\frac{n}{4}\). In a four-core platform, we can apply the GLS endomorphism to the left-to-right Montgomery ladder (Algorithm 1). Even though the GLV technique is ineffective for the classical Montgomery algorithm (due to the fact that we cannot share the point doublings between the base point and its endomorphism), the method permits an efficient splitting of the algorithm workload into two cores. In this way, one can use the first two cores for computing \(t\)-digits of the GLV subscalars \(k_1\) and \(k_2\) by means of Algorithm 3, while we allocate the other two cores to compute the rest of the scalar’s bits using Algorithm 1, as shown in Algorithm 6 (see Appendix A).
3.4 Cost Comparison of Montgomery Ladder Variants
Table 1 shows the computational costs associated to the Montgomery ladder variants described in this Section. The constants \(t_2\) and \(t_4\) represent the values of the parameter \(t\) chosen for the two- and four-core implementations, respectively.Footnote 3 All Montgomery ladder algorithms require a basic post-computation cost to retrieve the \(y\)-coordinate, which demands ten multiplications, one squaring and one inversion. Due to the application of the GLV technique, the Montgomery-LD-2-GLV halve-and-add version (corresponding to Algorithm 3), requires some few extra operations, namely, the subtraction of a point and the addition of two accumulators, which is performed using the López-Dahab (LD) projective coordinate formulae. In the end, one extra inversion is needed to convert the point representation from LD-projective coordinates to affine coordinates.
In the case of the parallel versions, the overhead is given by the post-computation done in one single core. The exact costs are mainly determined by the accumulator additions that are performed via full and mixed LD-projective formulae. In all of the timings reported in Sect. 5, we consider the LD-projective to affine coordinate transformation cost.
4 A Novel Regular \(\tau \)-Adic Approach
4.1 Recoding in \(\tau \)-Adic Form
The recoding approach proposed by Solinas finds an element \(\rho \in {\mathbb {Z}}[\tau ],\) of as small norm as possible, such that \(\rho \equiv k \pmod {\frac{\tau ^m-1}{\tau -1}}\). A \(\tau \)-adic expansion with average non-zero density \(\frac{1}{3}\) can be obtained by repeatedly dividing \(\rho \) by \(\tau \) and assigning the remainders to the digits \(u_i\) to obtain \(k = \sum _{i=0}^{i=l-1}u_i\tau ^i\). An alternative approach that does not involve multi-precision divisions, is to compute an element \(\rho ' = k\) partmod\(\left( \frac{\tau ^m-1}{\tau -1}\right) \) by performing a partial reduction procedure [37]. A width-\(w\) \(\tau \)-NAF expansion with non-zero density \(\frac{1}{w+1}\), where at most one of any \(w\) consecutive coefficients is non-zero, can also be obtained by repeatedly dividing \(\rho '\) by \(\tau ^w\) and assigning the remainders to the digit set \(\{0,\pm \alpha _1,\pm \alpha _3,\ldots ,\pm \alpha _{2^{w-1}-1}\}\), for \(\alpha _i=i \;\mathrm{mod}\;\tau ^w\). Under reasonable assumptions, this window-based recoding has length \(l \le m + 1\) [37].
In this section, a regular recoding version of the (width-\(w\)) \(\tau \)-NAF expansion is derived. The security advantages of such recoding are the predictable length and locations of non-zero digits in the expansion. This eliminates any side-channel information that an attacker could possibly collect regarding the operation executed at any iteration of the scalar multiplication algorithm (point doubling/Frobenius map or point addition). As long as querying a precomputed table of points to select the second operand of a point addition takes constant time, the resulting algorithm should be resistant against any timing-based side-channel attacks.
Let us first consider the integer recoding proposed by Joye and Tunstall [21]. They observed that any odd integer \(i\) in the interval \([0,2^{w})\) can be written as \(i = 2^{w-1} + (-(2^{w-1}-i))\). Repeatedly dividing an odd \(n\)-bit integer \(k - ((k \;\mathrm{mod}\;2^w) - 2^{w-1})\) by \(2^{w-1}\) maintains the parity and assigns the remainders to the digit set \(\{\pm 1, \ldots , \pm (2^{w-1}-1)\}\), producing an expansion of length \(\lceil 1 + \frac{n}{w-1}\)] with non-zero density \(\frac{1}{w-1}\). Our solution for the problem of finding a regular \(\tau \)-adic expansion employs the same intuition, as explained next.
Let \(\phi _w : {\mathbb {Z}}[\tau ] \rightarrow {\mathbb {Z}}_{2^w}\) be a surjective ring homomorphism induced by \(\tau \mapsto t_w\), for \(t_w^2 + 2 \equiv \mu t_w \pmod {2^w}\), with kernel \(\{\alpha \in {\mathbb {Z}}[\tau ] : \tau ^w\) divides \(\alpha \}\). An element \(i = i_0 + i_1\tau \) from \({\mathbb {Z}}[\tau ]\) with odd integers \(i_0,i_1 \in [0,2^w)\) satisfies the analogous property \(\phi _w(i) = 2^{w-1} + (-(2^{w-1}-\phi _w(i)))\). Repeated division of \((r_0 + r_1\tau ) - (((r_0 + r_1\tau ) \;\mathrm{mod}\;\tau ^w) - \tau ^{w-1})\) by \(\tau ^{w-1}\), correspondingly of \(\phi _w(\rho ') = (r_0+r_1t_w) - ((r_0 + r_1t_w \;\mathrm{mod}\;2^w) - 2^{w-1})\) by \(2^{w-1}\), obtains remainders that belong to the set \(\{0,\pm \alpha _1,\pm \alpha _3,\ldots ,\pm \alpha _{2^{w-1}-1}\}\). The resulting expansion always has length \(\lceil 1 + \frac{m+2}{w-1} \rceil \) and non-zero density \(\frac{1}{w-1}\). Algorithm 4 presents the recoding process for any \(w \ge 2\). The resulting recoding can also be seen as an adaption of the SPA-resistant recoding of [30], mapping to the digit set \(\{0,\pm \alpha _1,\pm \alpha _3,\ldots ,\pm \alpha _{2^{w-1}-1}\}\) instead of integers. While the non-zero densities are very similar, our scheme provides a performance benefit in the precomputation step, since the Frobenius map is usually faster than point doubling and preserves affine coordinates and consequently faster point additions.
4.2 Left-to-Right Regular Approach
Algorithm 5 presents a complete description of a regular scalar multiplication approach that uses as a building block the regular width-\(w\) \(\tau \)-recoding procedure just described.
For benchmarking purposes, we also included a baseline implementation of the customary Montgomery López-Dahab ladder. This allows easier comparisons with related work and permits to evaluate the impact of incomplete reduction in the field arithmetic performance (cf. Subsect. 5.2).
5 Implementation Issues and Results
In this Section, we discuss several implementation issues. We also present our experimental results and we compare them against state-of-the-art protected point multiplication implementations at the 128-bit security level.
5.1 Mechanisms to Achieve a Constant-Time GLS-Montgomery Ladder Implementation
To protect the previously described algorithms against timing attacks, we observed the following precautions:
Branchless Code. The main loop, the pre- and post-computation phases are implemented by a completely branch-free code.
Data Veiling. To guarantee a constant memory access pattern in the main loop of the Montgomery ladder algorithms, we proposed an efficient data veiling method, as described in Algorithm 7 of Appendix B. Algorithm 7 evaluates the actual and the previous scalar bits to decide whether the variables containing the Montgomery-LD accumulators values should or should not be masked. This strategy saves a considerable portion of the computational effort associated to Algorithm 1 of [4].
Field Arithmetic. Two of the base field arithmetic operations over \({\mathbb {F}}_{q}\) were implemented through look-up tables, namely, the half-trace and the multiplicative inverse operations. The half-trace is used to perform the point halving primitive, which is required in the pre-computation phase of the Montgomery-LD halve-and-add algorithm. The multiplicative inverse is one of the operations in the \(y\)-coordinate retrieval procedure, at the end of the Montgomery ladder algorithms. Also, whenever post-computational additions are necessary, inverses must be performed to convert a point from LD-projective to affine coordinates.
Although we are aware of the existence of protocols that consider the base point as a secret information [6], in which case one could not consider that our software provides protection against timing attacks, in the vast majority of protocols, the base point is public. Consequently, any attacks aimed at the two field operations mentioned above would be pointless.
5.2 Mechanisms to Achieve a Constant-Time Koblitz Implementation
Implementing Algorithm 5 in constant time needs some care, since all of its building blocks must be implemented in constant time.
Finite Field Arithmetic. Modern implementations of finite field arithmetic can make extensive use of vector registers, removing timing variances due to the cache hierarchy. For our illustrative implementation of curve NIST-K283, we closely follow the arithmetic described in Bluhm-Gueron [4], adopting the incomplete reduction improvement proposed by Negre-Robert [28].
Integer Recoding. All the branches in Algorithm 4 need to be eliminated by conditional execution statements to protect leakage of the scalar \(k\). Moreover, to remove the remaining sign-related branches, multiple precision integer arithmetic must be implemented in complement of two. If two constants, say \(\beta _u,\gamma _u,\) are stored in a precomputed table, then they need to be recovered by a linear pass across the table in constant time. Finally, the partial reduction step producing \(\rho '\) must also be implemented in constant time by removing all of its branches. Notice that the requirement for \(r_0,r_1\) to be odd is not a problem, since partial reduction can be modified to always result in odd integers, with a possible correction at the end of the scalar multiplication by performing a (protected) conditional subtraction of points (line 14 of Algorithm 5).
5.3 Results
Our implementation was mainly designed for the Intel Haswell processor family, which supports vectorial sets such as SSE and AVX, a carry-less multiplication and some bit manipulation instructions. The programming was done in C with the support of assembly inline code. The compilation was performed via GCC version \(4.7.3\) with the flags -m64 -march=core-avx2 -mtune=core-avx2 -O3 -fomit-frame-pointer -funroll-loops. Finally, the timings were collected on an Intel Core i7-4700MQ, with the Turbo Boost and Hyperthreading features disabledFootnote 4.
Table 2 presents the experimental timings obtained for the most prominent building blocks required for computing the point multiplication operation on the GLS and Koblitz binary elliptic curves.
We present in Table 3 a comparison of our timings against a selection of state-of-the-art implementations of the point multiplication operation on binary and prime elliptic curves. Due to the Montgomery-LD point doubling efficiency, which costs 49 % less than a point halving, the GLS-Montgomery-LD-double-and-add achieved the fastest timing in the one-core setting, with 70,800 clock cycles. This is 13 % faster than the performance obtained by the GLS-Montgomery-LD-halve-and-add algorithm. In the known-base point setting, we can ignore the GLS-Montgomery-LD-halve-and-add pre-computation expenses associated with its table of halved points. In that case, we can compute the scalar multiplication in an estimated time of 44,600 clock cycles using a table of just 4128 bytes.
Furthermore, the GLS-Montgomery-LD-halve-and-add is crucial for implementing the multi-core versions of the Montgomery ladder. When compared with our one-core double-and-add implementation, Table 3 reports a speedup of \(1.36\) and \(2.03\) in our two- and four-core Montgomery ladder versions, respectively. Here, besides the overhead costs commented in Sect. 3, we can clearly perceive the usual multicore management penalty. Finally, we observe that our GLS-Montgomery-LD-double-and-add surpasses by 48 %, 40 % and 2 % the Montgomery ladder implementations of [4] (Random), [4] (Koblitz) and [1], respectively.
As for our Koblitz implementations, the fast \(\tau \) endomorphism allows us to have a regular-recoding implementation that outperforms a standard Montgomery ladder for Koblitz curves by 18 %. In addition, our fastest Koblitz code surpasses by 16 % the recent implementation reported in [4]Footnote 5. Finally, note that, in spite of the fact that the \(\tau \) endomorphism is 26 % faster than the Montgomery-LD point doubling, the superior efficiency of the GLS quadratic field arithmetic produces faster results for the GLS Montgomery ladder algorithms.
6 Conclusion
We presented several algorithms that permit to compute a constant-time high-security point multiplication operation over two families of binary elliptic curves, namely, the GLS and the Koblitz curves. Although this work was completely focused on a high-end desk computation of the variable-base point multiplication, the possibility of applying Algorithm 3 to the fixed-base point multiplication setting is highly appealing since that procedure requires a comparatively small pre-computed table of roughly \(2n \cdot (n+1)\) bits for computing a point multiplication at the \(n\)-bit security level. The above combined with the Montgomery ladder unique feature of performing all the computations using only two point coordinates, should be attractive for deployments of public key cryptography on constrained computing environments.
Notes
- 1.
Corresponding to the Intel’s PCLMULQDQ instruction.
- 2.
Either \(b=1\) or \(\sqrt{b}\) is precomputed. Formula (5) can also be computed as \(Z_3 = (X_0 \cdot Z_0)^2\) and \(X_3 = (X_0^2 + \sqrt{b} \cdot Z_0^2)^2\).
- 3.
In our implementations (see Subsect. 5.3 below), the values used for the parameters \(t_2\) and \(t_4\) ranged from 53 to 55.
- 4.
We intend to submit our software to the ECRYPT Benchmarking of Cryptographic Systems (eBACS) SUPERCOP toolkit in the near future.
- 5.
We could not reproduce the timing of 118,000 cycles with the code available from [4], which indicates that TurboBoost could be possibly turned on their benchmarks. Considering this, our implementation of Koblitz-Montgomery-LD becomes 9 % faster than [4], reflecting the savings from partial reduction, and the speedup achieved by the Koblitz-regular implementation increases to 26 %.
References
Bernstein, D.J., Chuengsatiansup, C., Lange, T., Schwabe, P.: Kummer strikes back: new DH speed records. Cryptology ePrint Archive, Report 2014/134 (2014). http://eprint.iacr.org/
Bernstein, D.J., Lange, T.: SafeCurves: choosing safe curves for elliptic-curve cryptography. http://safecurves.cr.yp.to
Bernstein, D.J., Lange, T.: Security dangers of the NIST curves. Invited talk, International State of the Art Cryptography Workshop, Athens, Greece (2013)
Bluhm, M., Gueron, S.: Fast software implementation of binary elliptic curve cryptography. Cryptology ePrint Archive, Report 2013/741 (2013). http://eprint.iacr.org/
Bos, J.W., Costello, C., Hisil, H., Lauter, K.: Fast cryptography in genus 2. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 194–210. Springer, Heidelberg (2013)
Chatterjee, S., Karabina, K., Menezes, A.: A new protocol for the nearby friend problem. In: Parker, M.G. (ed.) Cryptography and Coding 2009. LNCS, vol. 5921, pp. 236–251. Springer, Heidelberg (2009)
Costello, C., Hisil, H., Smith, B.: Faster compact Diffie–Hellman: endomorphisms on the x-line. In: Nguyen, P.Q., Oswald, E. (eds.) EUROCRYPT 2014. LNCS, vol. 8441, pp. 183–200. Springer, Heidelberg (2014)
Dierks, T., Allen, C.: The TLS Protocol Version 1.0. RFC 2246 (Proposed Standard), January 1999. Obsoleted by RFC 4346, updated by RFCs 3546, 5746, 6176
Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.1. RFC 4346 (Proposed Standard), April 2006. Obsoleted by RFC 5246, updated by RFCs 4366, 4680, 4681, 5746, 6176
Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard), August 2008
Faz-Hernández, A., Longa, P., Sánchez, A.H.: Efficient and secure algorithms for GLV-based scalar multiplication and their implementation on GLV-GLS curves. In: Benaloh, J. (ed.) CT-RSA 2014. LNCS, vol. 8366, pp. 1–27. Springer, Heidelberg (2014)
Fog, A.: Instruction Tables: List of Instruction Latencies, Throughputs and Micro-operation Breakdowns for Intel, AMD and VIA CPUs. http://www.agner.org/optimize/instruction_tables.pdf. Accessed 14 May 2014
Galbraith, S.D., Lin, X., Scott, M.: Endomorphisms for faster elliptic curve cryptography on a large class of curves. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 518–535. Springer, Heidelberg (2009)
Gallant, R.P., Lambert, R.J., Vanstone, S.A.: Faster point multiplication on elliptic curves with efficient endomorphisms. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 190–200. Springer, Heidelberg (2001)
Gaudry, P., Hess, F., Smart, N.P.: Constructive and destructive facets of Weil descent on elliptic curves. J. Cryptol. 15, 19–46 (2002)
Gueron, S., Krasnov, V.: Fast prime field elliptic curve cryptography with 256 bit primes. Cryptology ePrint Archive, Report 2013/816 (2013). http://eprint.iacr.org/
Hankerson, D., Karabina, K., Menezes, A.: Analyzing the Galbraith-Lin-Scott point multiplication method for elliptic curves over binary fields. IEEE Trans. Comput. 58(10), 1411–1420 (2009)
Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, Secaucus (2003)
Hess, F.: Generalising the GHS attack on the elliptic curve discrete logarithm problem. LMS J. Comput. Math. 7, 167–192 (2004)
Huang, Y.-J., Petit, C., Shinohara, N., Takagi, T.: Improvement of Faugère et al.’s method to solve ECDLP. In: Sakiyama, K., Terada, M. (eds.) IWSEC 2013. LNCS, vol. 8231, pp. 115–132. Springer, Heidelberg (2013)
Joye, M., Tunstall, M.: Exponent recoding and regular exponentiation algorithms. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 334–349. Springer, Heidelberg (2009)
Koblitz, A.H., Koblitz, N., Menezes, A.: Elliptic curve cryptography: the serpentine course of a paradigm shift. J. Number Theory 131(5), 781–814 (2011)
Koblitz, N.: CM-curves with good cryptographic properties. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 279–287. Springer, Heidelberg (1992)
Longa, P., Sica, F.: Four-dimensional Gallant-Lambert-Vanstone scalar multiplication. J. Cryptol. 27(2), 248–283 (2014)
López, J., Dahab, R.: Fast multiplication on elliptic curves over GF(\(2^{\rm m}\)) without precomputation. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 316–327. Springer, Heidelberg (1999)
Montgomery, P.L.: Speeding the Pollard and elliptic curve methods of factorization. Math. Comput. 48, 243–264 (1987)
National Institute of Standards and Technology. Recommended Elliptic Curves for Federal Government Use. NIST Special Publication (1999). http://csrc.nist.gov/csrc/fedstandards.html
Négre, C., Robert, J.-M.: Impact of optimized field operations AB, AC and AB + CD in scalar multiplication over binary elliptic curve. In: Youssef, A., Nitaj, A., Hassanien, A.E. (eds.) AFRICACRYPT 2013. LNCS, vol. 7918, pp. 279–296. Springer, Heidelberg (2013)
Nègre, C., Robert, J.-M.:. New parallel approaches for scalar multiplication in elliptic curve over fields of small characteristic (2013). http://hal.archives-ouvertes.fr/docs/00/90/84/63/PDF/parallelization-ecsm8.pdf
Okeya, K., Takagi, T., Vuillaume, C.: Efficient representations on Koblitz curves with resistance to side channel attacks. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 218–229. Springer, Heidelberg (2005)
Oliveira, T., López, J., Aranha, D.F., Rodríguez-Henríquez, F.: Lambda coordinates for binary elliptic curves. In: Bertoni, G., Coron, J.-S. (eds.) CHES 2013. LNCS, vol. 8086, pp. 311–330. Springer, Heidelberg (2013)
Oliveira, T., López, J., Aranha, D.F., Rodríguez-Henríquez, F.: Two is the fastest prime: lambda coordinates for binary elliptic curves. J. Cryptogr. Eng. 4(1), 3–17 (2014)
Petit, C., Quisquater, J.-J.: On polynomial systems arising from a Weil descent. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 451–466. Springer, Heidelberg (2012)
Salowey, J.: Confirming consensus on removing RSA key transport from TLS 1.3. Transport Layer Security Working Group of the IETF Mailing List, 3 May 2014
Scott, M.: Re: NIST announces set of elliptic curves (1999). https://groups.google.com/forum/message/raw?msg=sci.crypt/mFMukSsORmI/FpbHDQ6hM_MJ
Shantz, M., Teske, E.: Solving the elliptic curve discrete logarithm problem using Semaev polynomials, Weil descent and Gröbner basis methods - an experimental study. Cryptology ePrint Archive, Report 2013/596 (2013). http://eprint.iacr.org/
Solinas, J.A.: Efficient arithmetic on Koblitz curves. Des. Codes Crypt. 19(2–3), 195–249 (2000)
Taverne, J., Faz-Hernández, A., Aranha, D.F., Rodríguez-Henríquez, F., Hankerson, D., López, J.: Speeding scalar multiplication over binary elliptic curves using the new carry-less multiplication instruction. J. Cryptogr. Eng. 1, 187–199 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendices
A Multi-core Montgomery Ladder
Here we present the four-core GLS-Montgomery-LD ladder algorithm. Given \(t_4\) the integer constant that establishes the workload of each algorithm, \(P \in E(\mathbb {F}_{q^2})\), and the scalar \(k\) represented as \(k_1 + k_2\cdot \delta \) using the GLS-GLV method, cores \(I\) and \(II\) are both responsible for computing \(\lfloor \frac{n}{2}\rfloor -t_4\) bits of the subscalars \(k_1\) and \(k_2\) using the Montgomery-LD double-and-add method. In turn, the cores \(III\) and \(IV\), both compute \(t_4\) bits of \(k_1\) and \(k_2\) with the Montgomery-LD halve-and-add algorithm. In the end, on a single core, it is necessary to add all the accumulators \(Q_i\), for \(i = 0 \ldots 3\).
B Memory Access Pattern
The following data veiling algorithm ensures a fixed memory access pattern for all Montgomery-LD ladder algorithms. Given the two Montgomery-LD ladder accumulators \(A\) and \(B\), and the scalar \(k = (k_{n-1}, k_{n-2}, \ldots k_{0})\), this method allows us, in the beginning of the \(i\)-th main loop iteration, to use the bits \(k_{i-1}\) and \(k_i\) to decide if \(A\) and \(B\) will or will not be swapped. As a result, it is not necessary to reapply the procedure at the end of the \(i\)-th iteration.
C GLS Elliptic Curve Parameters
For achieving a greater benefit from the multiplication by the \(b\)-constant in the Montgomery-LD doubling formula \(X_3 = {X_0}^4 + b{Z_0}^4 = ({X_0}^2 + \sqrt{b}{Z_0}^2)^2\) we carefully selected a GLS curve with a 64-bit \(b\)-parameter square-root. As a result, we saved two carry-less multiplication and a dozen of SSE instructions per field multiplication. Next, we describe the parameters, as polynomials represented in hexadecimal, for our GLS curve \(E_{a,b}/{\mathbb {F}}_{q^2} : y^2 + xy = x^3 + ax^2 + b\).
-
\(a = u\)
-
\(b = \mathtt{0x54045144410401544101540540515101 }\)
-
\(\sqrt{b} = \mathtt{0xE2DA921E91E38DD1 }\)
The 253-bit prime order \(r\) of the main subgroup of \(E_{a,b}/{\mathbb {F}}_{q^2}\) is,
Also, the integer \(\delta \) such that \(\psi (P) = \delta P\) for all \(P \in E_{a,b}\) is,
The base point \(P = (x, y)\) of order \(r\) used in this work is,
Finally, the towering of our field \({\mathbb {F}}_{q} \cong {\mathbb {F}}_{2}[x]/(f(x))\) and its quadratic extension \({\mathbb {F}}_{q^2} \cong {\mathbb {F}}_{q}[u]/(g(x))\) is constructed by means of the irreducible trinomials \(f(x) = x^{127} + x^{63} + 1\) and \(g(u) = u^2 + u + 1\).
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Oliveira, T., Aranha, D.F., López, J., Rodríguez-Henríquez, F. (2014). Fast Point Multiplication Algorithms for Binary Elliptic Curves with and without Precomputation. In: Joux, A., Youssef, A. (eds) Selected Areas in Cryptography -- SAC 2014. SAC 2014. Lecture Notes in Computer Science(), vol 8781. Springer, Cham. https://doi.org/10.1007/978-3-319-13051-4_20
Download citation
DOI: https://doi.org/10.1007/978-3-319-13051-4_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-13050-7
Online ISBN: 978-3-319-13051-4
eBook Packages: Computer ScienceComputer Science (R0)