Efficient Construction of Elliptic Curves over Optimal Extension Field
スポンサーリンク
概要
- 論文の詳細を見る
Recently, Bailey and Paar proposed the Optimal Extension Field (OEF) which is defined over a base field with a computer's word size. Since the arithmetic in an OEF is relatively faster than that in F_<2n>, elliptic curves over an OEF would be more attractive when applied to a smart card, a personal computer, etc. However the definition of an OEF is rather strict since it is based on a general condition sufficient for fast arithmetic. In this paper, we extend the definition of an OEF such that it includes more extension fields with efficient arithmetic. Furthermore we construct elliptic curves over an OEF including our extended OEF efficiently by applying the SEA algorithm. Our implementation can count order of elliptic curves over 155-bit extended OEF and 160-bit OEF in 10.1 and 11.6 seconds on average on PentiumII 400 MHz(Linux-2.2.5), respectively.
- 一般社団法人情報処理学会の論文
- 2000-08-15
著者
-
MIYAJI Atsuko
Japan Advanced Institute of Science and Technology
-
FUTA YUICHI
Matsushita Electric Inclustrial Co., Ltd.
-
Futa Y
Matsushita Electric Industrial Co. Ltd. Kadoma‐shi Jpn
-
Miyaji Atsuko
Japan Advanced Inst. Of Sci. And Technol. Ishikawa‐ken Jpn
-
Miyaji Atsuko
Japan Advanced Inst. Of Sci. And Technol.
関連論文
- New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences
- New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences
- Sequential Bitwise Sanitizable Signature Schemes
- Generalized Scalar Multiplication Secure against SPA, DPA, and RPA
- The security of RC6 against asymmetric Chi-square test attack
- Evaluation of the Security of RC6 against the χ^2-Attack
- Secure Elliptic Curve Exponentiation against RPA, ZRA, DPA, and SPA
- Ancestor Excludable Hierarchical ID-based Encryption and Its Application to Broadcast Encryption
- New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences
- A Second-price Sealed-bid Auction with Public Verifiability
- An Anonymous Sealed-bid Auction with a Feature of Entertainment
- Software Obfuscation on a Theoretical Basis and Its Implementation
- Statistical Analysis of chi-square Attacks
- Cryptanalysis of Reduced-Round RC6 without Whitening
- Improved Correlation Attack on RC5
- A General Model of Multisignature Schemes with Message Flexibility, Order Flexibility, and Order Verifiability
- New Explicit Conditions of Elliptic Curve Traces for FR-Reduction
- Efficient Construction of Elliptic Curves over Optimal Extension Field
- A Countermeasure for Protecting NTRUSign against the Transcript Attack
- Sequential Bitwise Sanitizable Signature Schemes
- Revisited (Hyper)-Elliptic Curve Scalar Multiplication with a Fixed Point
- New Concrete Relation between Trace, Definition Field, and Embedding Degree
- Efficinet Group Signature Scheme Based on a Modified Nyberg-Rueppel Signature (特集 多様な社会的責任を担うコンピュータセキュリティ技術)
- Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted Nodes
- Cryptanalysis of Stream Ciphers from a New Aspect: How to Apply Key Collisions to Key Recovery Attack
- The Security of RC6 against Asymmetric Chi-square Test Attack
- The Security of RC6 against Asymmetric Chi-square Test Attack
- Ancestor Excludable Hierarchical ID-based Encryption and Its Application to Broadcast Encryption
- Secure Dynamic Hourglass Protocol for Untrusted Server