Citation
Abstract
Elliptic curve cryptosystems (ECC) provides better security for each bit key utilized compared to the RSA cryptosystem. For this reason, it is projected to have more practical usage than the RSA. In ECC, scalar multiplication (or point multiplication) is the dominant operation, namely, computing nP from a point P on an elliptic curve, where n is an integer defined as the point resulting from adding P + P + ... + P , n times. However, for practical uses, it is very important to improve the efficiency of the scalar multiplication. Solinas (1997) proposes that the τ-adic Non-Adjacent Form (τ-NAF) is one of the most efficient algorithms used to compute scalar multiplications on Anomalous Binary curves. In this paper, we give a new property (i.e., Theorem 1.2) of τ-NAF(n) representation for every length, l. This is useful for evaluating the maximum and minimum norms occurring among all length-l elements of Z(τ). We also propose a new cryptographic method by using randomization of a multiplier n to ñ an element of Z(τ). It is based on τ-NAF. We focused on estimating the length of RTNAF(ñ) expansion by using a new method.
Download File
Official URL or Download Paper: http://www.pertanika.upm.edu.my/current_issues.php...
|
Additional Metadata
Item Type: | Article |
---|---|
Divisions: | Faculty of Science Institute for Mathematical Research |
Publisher: | Universiti Putra Malaysia Press |
Keywords: | Anomalous Binary Curves (Koblitz Curves); Scalar multiplication; τ -adic Non-Adjacent Form; Norm |
Depositing User: | Nabilah Mustapa |
Date Deposited: | 25 Jun 2015 00:49 |
Last Modified: | 25 Jun 2015 00:49 |
URI: | http://psasir.upm.edu.my/id/eprint/36248 |
Statistic Details: | View Download Statistic |
Actions (login required)
View Item |