Montgomery curves and their arithmetic: The case of large characteristic fields

C Costello, B Smith - Journal of Cryptographic Engineering, 2018 - Springer
Three decades ago, Montgomery introduced a new elliptic curve model for use in Lenstra's
ECM factorization algorithm. Since then, his curves and the algorithms associated with them …

High-speed high-security signatures

DJ Bernstein, N Duif, T Lange, P Schwabe… - Journal of cryptographic …, 2012 - Springer
This paper shows that a $390 mass-market quad-core 2.4 GHz Intel Westmere (Xeon
E5620) CPU can create 109000 signatures per second and verify 71000 signatures per …

Cryptographic accelerators for digital signature based on Ed25519

M Bisheh-Niasar, R Azarderakhsh… - … Transactions on Very …, 2021 - ieeexplore.ieee.org
This article presents highly optimized implementations of the Ed25519 digital signature
algorithm [Edwards curve digital signature algorithm (EdDSA)]. This algorithm significantly …

Montgomery curves and the Montgomery ladder

DJ Bernstein, T Lange - 2017 - research.tue.nl
The Montgomery ladder is a remarkably simple method of computing scalar multiples of
points on a broad class of elliptic curves. This article surveys a wide range of topics related …

The simplest protocol for oblivious transfer

T Chou, C Orlandi - Progress in Cryptology--LATINCRYPT 2015: 4th …, 2015 - Springer
Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this
paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is …

Elligator: elliptic-curve points indistinguishable from uniform random strings

DJ Bernstein, M Hamburg, A Krasnova… - Proceedings of the 2013 …, 2013 - dl.acm.org
Censorship-circumvention tools are in an arms race against censors. The censors study all
traffic passing into and out of their controlled sphere, and try to disable censorship …

Elliptic curve lightweight cryptography: A survey

CA Lara-Nino, A Diaz-Perez… - IEEE Access, 2018 - ieeexplore.ieee.org
Since it was invented in 1986, elliptic curve cryptography (ECC) has been studied widely in
industry and academy from different perspectives. Some of these aspects include …

Optimized ECC implementation for secure communication between heterogeneous IoT devices

L Marin, M Piotr Pawlowski, A Jara - Sensors, 2015 - mdpi.com
The Internet of Things is integrating information systems, places, users and billions of
constrained devices into one global network. This network requires secure and private …

On emerging family of elliptic curves to secure internet of things: ECC comes of age

Z Liu, X Huang, Z Hu, MK Khan… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Lightweight Elliptic Curve Cryptography (ECC) is a critical component for constructing the
security system of Internet of Things (IoT). In this paper, we define an emerging family of …

FPGA implementation of high-speed area-efficient processor for elliptic curve point multiplication over prime field

MM Islam, MS Hossain, MK Hasan, M Shahjalal… - IEEE …, 2019 - ieeexplore.ieee.org
Developing a high-speed elliptic curve cryptographic (ECC) processor that performs fast
point multiplication with low hardware utilization is a crucial demand in the fields of …