Randomized mixed-radix scalar multiplication

E Guerrini, L Imbert… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
A set of congruence relations is a z-covering if each integer belongs to at least one
congruence class from that set. In this paper, we first show that most existing scalar …

Breaking randomized mixed-radix scalar multiplication algorithms

J Detrey, L Imbert - Progress in Cryptology–LATINCRYPT 2019: 6th …, 2019 - Springer
In this paper we present a novel, powerful attack on a recently introduced randomized scalar
multiplication algorithm based on covering systems of congruences. Our attack can recover …

Parallelized Side-Channel Attack Resisted Scalar Multiplication Using q-Based Addition-Subtraction k-chains

K Phalakarn, K Phalakarn… - … on Computing and …, 2016 - ieeexplore.ieee.org
This paper presents parallel scalar multiplication techniques for elliptic curve cryptography
using q-based addition-subtraction k-chain which can also effectively resist side-channel …

Dynamic systems development: towards continuity, growth and evolution

D Dalcher - 10th IEEE International Conference and Workshop …, 2003 - ieeexplore.ieee.org
The dynamic nature of knowledge and software evolution and usage present a pervasive
challenge to system developers. Discrete attempts to create such systems often lead to a …

Stochastic Heuristic Approach to Addition Chain Problem in PKC for Efficiency and Security Effectiveness

AM Noma, A Muhammad - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
This paper shows that stochastic heuristic approach for implicitly solving addition chain
problem (ACP) in public-key cryptosystem (PKC) enhances the efficiency of the PKC and …

Using Random Digit Representation for Elliptic Curve Scalar Multiplication

M Mostafa - 2018 - uwspace.uwaterloo.ca
Elliptic Curve Cryptography (ECC) was introduced independently by Miller and Koblitz in
1986. Compared to the integer factorization based Rivest-Shamir-Adleman (RSA) …

[PDF][PDF] w-Bit Shifting Non-Adjacent Form Conversion

DH Hwang, YH Choi - … on Internet and Information Systems (TIIS), 2018 - koreascience.kr
As a unique form of signed-digit representation, non-adjacent form (NAF) minimizes
Hamming weight by removing a stream of non-zero bits from the binary representation of …