Abstract
Elliptic curves have been studied for many years. Recent interest has revolved around their applicability to factoring integers and to cryptography. In this paper we explore the feasibility of implementing in hardware an arithmetic processor for doing elliptic curve computations over fields of characteristic two. The elliptic curve analogue of the ElGamal cryptosystem is also analyzed.
Preview
Unable to display preview. Download preview PDF.
References
G. Agnew, T. Beth, R. Mullin, and S. Vanstone, “Arithmetic operations in GF(2m), submitted to Journal of Cryptology.
G. Agnew, R. Mullin, I. Onyszchuk and S. Vanstone, “An implementation for a fast public key cryptosystem”, to appear.
D. Ash, I. Blake and S. Vanstone, “Low complexity normal bases”, Discrete Applied Mathematics, 25 (1989), 191–210.
W. Diffie and M. Hellman, “New directions in cryptography”, IEEE Transactions on Information Theory, 22 (1976), 644–654.
T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms”, IEEE Transactions on Information Theory, 31 (1985), 469–472.
J. Hastad, “On using RSA with low exponent in a public key network”, Advances in Cryptology: Proceedings of Crypto '85, Lecture Notes in Computer Science, 218 (1986), Springer Verlag, 403–408.
N. Koblitz, “Elliptic curve cryptosystems”, Mathematics of Computation, 48 (1987), 203–209.
N. Koblitz, Course in Number Theory and Cryptography, Springer-Verlag, New York, 1987.
A. Menezes and S. Vanstone, “Isomorphism classes of elliptic curves over finite fields”, Research Report CORR 90-1, Department of Combinatorics and Optimization, University of Waterloo, January 1990.
V. Miller, “Uses of elliptic curves in cryptography”, Advances in Cryptology: Proceedings of Crypto '85, Lecture Notes in Computer Science, 218 (1986), Springer Verlag, 417–426.
P. Montgomery, “Speeding the Pollard and elliptic curve methods of factorization”, Mathematics of Computation, 48 (1987), 243–264.
R. Mullin, I. Onyszchuk, S. Vanstone and R. Wilson, “Optimal normal bases in GF(p n)”, Discrete Applied Mathematics, 22 (1988/89), 149–161.
T. Rosati, “A high speed data encryption processor for public key cryptography”, Proceedings of IEEE Custom Integrated Circuits Conference, San Diego (1989), 12.3.1–12.3.5.
J. Silverman, The Arithmetic of Elliptic Curves, Springer-Verlag, New York, 1986.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1990 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Menezes, A., Vanstone, S. (1990). The implementation of elliptic curve cryptosystems. In: Seberry, J., Pieprzyk, J. (eds) Advances in Cryptology — AUSCRYPT '90. AUSCRYPT 1990. Lecture Notes in Computer Science, vol 453. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0030345
Download citation
DOI: https://doi.org/10.1007/BFb0030345
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-53000-8
Online ISBN: 978-3-540-46297-2
eBook Packages: Springer Book Archive