Although it is one of the most popular signature schemes today, ECDSA presents a number of implementation pitfalls, in particular due to the very sensitive nature of the random value …
Elliptic Curve Cryptography (ECC) based security protocols require much shorter key space which makes ECC the most suitable option for resource-limited devices as compared to the …
We select a set of elliptic curves for cryptography and analyze our selection from a performance and security perspective. This analysis complements recent curve proposals …
We provide two improvements to Regev's quantum factoring algorithm (arXiv: 2308.06572), addressing its space efficiency and its noise-tolerance. Our first contribution is to improve the …
M Al-Zubaidie, Z Zhang, J Zhang - arXiv preprint arXiv:1902.10313, 2019 - arxiv.org
Public-key cryptography algorithms, especially elliptic curve cryptography (ECC) and elliptic curve digital signature algorithm (ECDSA) have been attracting attention from many …
We improve the space efficiency of Regev's quantum factoring algorithm [Reg23] while keeping the circuit size the same. Our main result constructs a quantum factoring circuit …
Y Hao, S Zhong, M Ma, R Jiang, S Huang, J Zhang… - Electronics, 2022 - mdpi.com
In this paper, we present a novel lightweight elliptic curve scalar multiplication architecture for random Weierstrass curves over prime field F p. The elliptic curve scalar multiplication is …
In this survey paper, we present a careful analysis of the Montgomery ladder procedure applied to the computation of the constant-time point multiplication operation on elliptic …
M Rivain - Cryptology ePrint Archive, 2011 - eprint.iacr.org
Elliptic curve cryptosystems are more and more widespread in everyday-life applications. This trend should still gain momentum in coming years thanks to the exponential security …