/
/
/
Overview of Addition Formulas for Elliptic Curves Over GF (2n) In Cryptography

Overview of Addition Formulas for Elliptic Curves Over GF (2n) In Cryptography

Original Research ArticleNov 12, 2018Vol. 5 No. 1 (2005)

Abstract

There are several techniques for projective coordinate that can be used for speeding up the computation kP over GF (2n). In this paper we overview all this techniques method in projective coordinate and introduce a new efficient formula in projective coordinates. This formula used the idea of reducing the number of underlying field multiplication. Elliptic curve protocols and applications can be implemented with better performance using the suggested formula.

Keywords: Elliptic Curves over GF (2n), Projective Coordinate, Cryptography.

Corresponding author: E-mail: Iqbal501@yahoo.com

How to Cite

Jebril, I. H. ., Salleh, R. ., & M., A. . (2018). Overview of Addition Formulas for Elliptic Curves Over GF (2n) In Cryptography. CURRENT APPLIED SCIENCE AND TECHNOLOGY, 52-61.

References

  • http://www.certicom.com, Jan. 2001.
  • De Win, E., Bosselaers, A., Vanderberghe, S., De Gersem P. and Vandewalle, J, 1996. A fast software implementation for artithmetic operations in GF(2),” Advances in Cryptology, Proc. Asiacrypt’96, LNCS 1163, K. Kim and T. Matsumoto, Eds., Springer-Verlag, p. 65-76.
  • Eberle, H., Gura, N., Chang Shantz S. and Gupta, V, 2003. A Cryptographic Processor for Arbitrary Elliptic Curves over GF(2m), Sun Microsystems Laboratories, Ins. Printed in U.S.A. May.
  • Hankerson, D., Lopez, J. and Menezes, A, 2000. Software Implementation of Elliptic Curve Cryptography over Binary Fields, Proc. Cryptographic Hardware and Embedded Systems-CHES 2000, pp. 1-24.
  • IEEE P1363, 2001. Standard Specifications for Public Key Cryptography, draft.

Author Information

Iqbal H. Jebril

Faculty of Computer Science and Information Technology, University of Malaya

Rosli Salleh

Faculty of Computer Science and Information Technology, University of Malaya

Al-Shawabkeh M.

Faculty of Computer Science and Information Technology, University of Malaya

About this Article

Journal

Vol. 5 No. 1 (2005)

Type of Manuscript

Original Research Article

Keywords

Elliptic Curves over GF (2n), Projective Coordinate, Cryptography.

Published

12 November 2018