Keyword : elliptic curve cryptography


FPGA Implementation of Various Elliptic Curve Pairings over Odd Characteristic Field with Non Supersingular Curves
Yasuyuki NOGAMI Hiroto KAGOTANI Kengo IOKIBE Hiroyuki MIYATAKE Takashi NARITA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/04/01
Vol. E99-D  No. 4 ; pp. 805-815
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Cryptography and cryptographic protocols
Keyword: 
elliptic curve cryptographypairing-based cryptographyodd characteristicFPGA implementation
 Summary | Full Text:PDF(1MB)

Improving Width-3 Joint Sparse Form to Attain Asymptotically Optimal Complexity on Average Case
Hiroshi IMAI Vorapong SUPPAKITPAISARN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/06/01
Vol. E98-A  No. 6 ; pp. 1216-1222
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
analysis of algorithmsnumber representationelliptic curve cryptographymulti-scalar multiplicationwidth-3 joint sparse form
 Summary | Full Text:PDF(495.5KB)

Two Lower Bounds for Shortest Double-Base Number System
Parinya CHALERMSOOK Hiroshi IMAI Vorapong SUPPAKITPAISARN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/06/01
Vol. E98-A  No. 6 ; pp. 1310-1312
Type of Manuscript:  LETTER
Category: Algorithms and Data Structures
Keyword: 
analysis of algorithmsnumber representationelliptic curve cryptographydouble-base number systemdouble-base chain
 Summary | Full Text:PDF(80.5KB)

Exact Power Analysis of Unified Code over Generalized Mersenne Prime Fields
Toshiyuki MASUE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/02/01
Vol. E96-A  No. 2 ; pp. 618-625
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
side channel attackgeneralized Mersenne primeunified codeelliptic curve cryptography
 Summary | Full Text:PDF(1.4MB)

Unified Dual-Radix Architecture for Scalable Montgomery Multiplications in GF(P) and GF(2n)
Kazuyuki TANIMURA Ryuta NARA Shunitsu KOHARA Youhua SHI Nozomu TOGAWA Masao YANAGISAWA Tatsuo OHTSUKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/09/01
Vol. E92-A  No. 9 ; pp. 2304-2317
Type of Manuscript:  PAPER
Category: VLSI Design Technology and CAD
Keyword: 
elliptic curve cryptographydual-radixmodular multiplicationMontgomery multiplicationscalabilityunified
 Summary | Full Text:PDF(1.6MB)

New Hardware Architecture for Multiplication over GF(2m) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography
Soonhak KWON Taekyoung KWON Young-Ho PARK 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1 ; pp. 236-243
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Implementation
Keyword: 
Massey-Omura multiplierBerlekamp bit serial multiplierGaussian normal basisdual basiselliptic curve cryptographyNIST
 Summary | Full Text:PDF(298.2KB)

Scaling Security of Elliptic Curves with Fast Pairing Using Efficient Endomorphisms
Katsuyuki TAKASHIMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A  No. 1 ; pp. 152-159
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Elliptic Curve Cryptography
Keyword: 
elliptic curve cryptographypairingID-based cryptography
 Summary | Full Text:PDF(156KB)

A New Type of Fast Endomorphisms on Jacobians of Hyperelliptic Curves and Their Cryptographic Application
Katsuyuki TAKASHIMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1 ; pp. 124-133
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Elliptic Curve Cryptography
Keyword: 
elliptic curve cryptographyhyperelliptic curve cryptographyscalar multiplicationGLV methodreal multiplication
 Summary | Full Text:PDF(192.6KB)

Identity-Based Key Agreement for Peer Group Communication from Pairings
Shyi-Tsong WU Jung-Hui CHIU Bin-Chang CHIEU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/10/01
Vol. E88-A  No. 10 ; pp. 2762-2768
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
identity-basedpairinggroup key agreementelliptic curve cryptography
 Summary | Full Text:PDF(291.4KB)

Elliptic Curve Cryptosystem on Smart Card Access with Threshold Scheme
Shyi-Tsong WU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/10/01
Vol. E86-A  No. 10 ; pp. 2569-2576
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Information Security
Keyword: 
cryptosystemelliptic curve cryptographysmart cardthreshold scheme
 Summary | Full Text:PDF(548.8KB)

Use of Montgomery Trick in Precomputation of Multi-Scalar Multiplication in Elliptic Curve Cryptosystems
Katsuyuki OKEYA Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1 ; pp. 98-112
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Asymmetric Ciphers
Keyword: 
elliptic curve cryptographymulti-scalar multiplicationprecomputationMontgomery tricksimultaneous
 Summary | Full Text:PDF(305.4KB)

A Fast Finite Field Multiplier Architecture for High-Security Elliptic Curve Cryptosystems
Sangook MOON Yong Joo LEE Jae Min PARK Byung In MOON Yong Surk LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2002/02/01
Vol. E85-D  No. 2 ; pp. 418-420
Type of Manuscript:  LETTER
Category: Applications of Information Security Techniques
Keyword: 
finite field multiplierelliptic curve cryptographysecurityVLSI
 Summary | Full Text:PDF(185KB)

Realizing the Menezes-Okamoto-Vanstone (MOV) Reduction Efficiently for Ordinary Elliptic Curves
Junji SHIKATA Yuliang ZHENG Joe SUZUKI Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/04/25
Vol. E83-A  No. 4 ; pp. 756-763
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
elliptic curve cryptographyelliptic curve discrete logarithm problemMenezes-Okamoto-Vanstone (MOV) algorithmsupersingular elliptic curvesordinary elliptic curves
 Summary | Full Text:PDF(458KB)