High-performance Implementation of Elliptic Curve Cryptography Using Vector Instructions
DOI10.1145/3309759zbMath1486.94099OpenAlexW2966682887WikidataQ113310026 ScholiaQ113310026MaRDI QIDQ4960943
Ricardo Dahab, Armando Faz-Hernández, Julio López
Publication date: 24 April 2020
Published in: ACM Transactions on Mathematical Software (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/3309759
elliptic curve cryptographyDiffie-Hellman protocolEd25519secure softwareAVX2 vector instructionsEdwards digital signature algorithm
Cryptography (94A60) Software, source code, etc. for problems pertaining to information and communication theory (94-04)
Related Items (3)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A fast algorithm for computing multiplicative inverses in \(\text{GF}(2^ m)\) using normal bases
- Attacking embedded ECC implementations through CMOV side channels
- Kummer for genus one over prime order fields
- How to (pre-)compute a ladder -- improving the performance of X25519 and X448
- Efficient arithmetic on Koblitz curves
- Koblitz curves over quadratic fields
- Fast Point Multiplication Algorithms for Binary Elliptic Curves with and without Precomputation
- Sandy2x: New Curve25519 Speed Records
- Four $$\mathbb {Q}$$ : Four-Dimensional Decompositions on a $$\mathbb {Q}$$ -curve over the Mersenne Prime
- Faster Implementation of Scalar Multiplication on Koblitz Curves
- Kummer Strikes Back: New DH Speed Records
- Fast Implementation of Curve25519 Using AVX2
- High-Speed High-Security Signatures
- Twisted Edwards Curves
- Highly Regular Right-to-Left Algorithms for Scalar Multiplication
- Twisted Edwards Curves Revisited
- Speeding the Pollard and Elliptic Curve Methods of Factorization
- Efficient and Secure Algorithms for GLV-Based Scalar Multiplication and Their Implementation on GLV-GLS Curves
- Public Key Cryptography - PKC 2006
This page was built for publication: High-performance Implementation of Elliptic Curve Cryptography Using Vector Instructions