Sandy2x: new Curve25519 speed records
From MaRDI portal
Publication:2807200
DOI10.1007/978-3-319-31301-6_8zbMATH Open1396.94069OpenAlexW2402976487MaRDI QIDQ2807200FDOQ2807200
Authors: Tung Chou
Publication date: 19 May 2016
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-31301-6_8
Recommendations
Cites Work
- Kummer Strikes Back: New DH Speed Records
- High-speed high-security signatures
- Twisted Edwards Curves Revisited
- Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication
- Fast Cryptography in Genus 2
- Public Key Cryptography - PKC 2006
- Faster Compact Diffie–Hellman: Endomorphisms on the x-line
- On Polynomial Systems Arising from a Weil Descent
- Index calculus attack for hyperelliptic curves of small genus
- Lambda Coordinates for Binary Elliptic Curves
- High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers
- Fast Elliptic-Curve Cryptography on the Cell Broadband Engine
Cited In (12)
- Kummer for genus one over prime-order fields
- High-throughput elliptic curve cryptography using AVX2 vector instructions
- How to (pre-)compute a ladder -- improving the performance of X25519 and X448
- Public Key Cryptography - PKC 2006
- Kummer versus Montgomery Face-off over Prime Order Fields
- NTRU prime: reducing attack surface at low cost
- RLWE/PLWE equivalence for totally real cyclotomic subextensions via quasi-Vandermonde matrices
- The complete cost of cofactor \(h=1\)
- A Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA)
- High-performance Implementation of Elliptic Curve Cryptography Using Vector Instructions
- Four\(\mathbb {Q}\)NEON: faster elliptic curve scalar multiplications on ARM processors
- Efficient arithmetic in (pseudo-)Mersenne prime order fields
Uses Software
This page was built for publication: Sandy2x: new Curve25519 speed records
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2807200)