High-throughput elliptic curve cryptography using AVX2 vector instructions
DOI10.1007/978-3-030-81652-0_27zbMATH Open1485.94071OpenAlexW3184495916MaRDI QIDQ832404FDOQ832404
Authors: Hao Cheng, Johann Großschädl, Jiaqi Tian, Peter B. Rønne, Peter Y. A. Ryan
Publication date: 25 March 2022
Full work available at URL: http://orbilu.uni.lu/handle/10993/48810
Recommendations
advanced vector extension 2 (AVX2)Curve25519single instruction multiple data (SIMD)throughput-optimized cryptography
Cryptography (94A60) Elliptic curves over local fields (11G07) Curves over finite and local fields (11G20) Applications to coding theory and cryptography of arithmetic geometry (14G50)
Cites Work
- Twisted Edwards Curves
- Twisted Edwards Curves Revisited
- Speeding the Pollard and Elliptic Curve Methods of Factorization
- Public Key Cryptography - PKC 2006
- Title not available (Why is that?)
- Batch Binary Edwards
- Sandy2x: new Curve25519 speed records
- Fast implementation of Curve25519 using AVX2
- Montgomery multiplication using vector instructions
- Software implementation of modular exponentiation, using advanced vector instructions architectures
- On Software Parallel Implementation of Cryptographic Pairings
- Title not available (Why is that?)
- High-performance implementation of elliptic curve cryptography using vector instructions
Cited In (7)
- Vector Instruction Set Extensions for Efficient Computation of <sc>Keccak</sc>
- An implementation of parallel number-theoretic transform using Intel AVX-512 instructions
- Software implementation of modular exponentiation, using advanced vector instructions architectures
- Fast implementation of Curve25519 using AVX2
- High-performance implementation of elliptic curve cryptography using vector instructions
- Efficient techniques for high-speed elliptic curve cryptography
- Title not available (Why is that?)
Uses Software
This page was built for publication: High-throughput elliptic curve cryptography using AVX2 vector instructions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q832404)