Synonyms
Related Concepts
Definition
Koblitz curves are elliptic curves defined over \(\mathbb{F}[2]\).
Background
Koblitz curves, also known as anomalous binary curves, were proposed by Koblitz [2] for cryptographic use. Compared to random binary curves, significantly faster point multiplication methods are available.
Applications
Elliptic curves \({E}_{a} : {y}^{2} + xy = {x}^{3} + a{x}^{2} + 1\) defined over \(\mathbb{F}[2]\) (with a ∈ { 0, 1}), known as Koblitz curves, permit computationally attractive point multiplication algorithms that replace point doubling by inexpensive field-squaring operations. The basic strategy is outlined here; see [3] for details.
Let m > 0 be an integer. Given a point \((x,y) \in {E}_{a}(\mathbb{F}[{2}^{m}])\), the Frobenius map \(\tau : (x,y)\mapsto ({x}^{2},{y}^{2})\) gives another point in \({E}_{a}(\mathbb{F}[{2}^{m}])\), and this mapping can be exploited in point multiplication....
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Hankerson D, Menezes A, Vanstone S (2003) Guide to elliptic curve cryptography, Springer, New York
Koblitz N (1992) CM-curves with good cryptographic properties. In Advances in Cryptology—CRYPTO 2001, Lecture Notes in Computer Science, vol 576. Springer, New York pp 279–287.
Solinas J (2000) Efficient arithmetic on Koblitz curves. Design Codes Cryptogr 19:195–249
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Hankerson, D., Menezes, A. (2011). Koblitz Elliptic Curves. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_872
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_872
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering