Open Access Open Access  Restricted Access Subscription Access

Survey of Elliptic Curve Scalar Multiplication Algorithms


Affiliations
1 Department of Computer Science, Government Arts College, Udumalpet – 642126, India
 

The standard bodies accepted elliptic curve cryptography as an efficient and alternative public key cryptosystem for the next generation cryptographic applications. The most dominant operation in this cryptosystem is the scalar multiplication. In this paper, we study various scalar multiplication algorithms with respect to the efficiency, average hamming weight and memory requirements etc. This paper gives an idea and the areas for which the researchers can proceed further.

Keywords

Elliptic Curve Cryptography, Binary Method, Non-Adjacent form, Scalar Multiplication.
User
Notifications
Font Size

Abstract Views: 101

PDF Views: 4




  • Survey of Elliptic Curve Scalar Multiplication Algorithms

Abstract Views: 101  |  PDF Views: 4

Authors

E. Karthikeyan
Department of Computer Science, Government Arts College, Udumalpet – 642126, India

Abstract


The standard bodies accepted elliptic curve cryptography as an efficient and alternative public key cryptosystem for the next generation cryptographic applications. The most dominant operation in this cryptosystem is the scalar multiplication. In this paper, we study various scalar multiplication algorithms with respect to the efficiency, average hamming weight and memory requirements etc. This paper gives an idea and the areas for which the researchers can proceed further.

Keywords


Elliptic Curve Cryptography, Binary Method, Non-Adjacent form, Scalar Multiplication.