Displaying 1 publication

Abstract:
Sort:
  1. Faridah Yunos, Kamel Ariffin Mohd Atan, Muhammad Rezal Kamel Ariffin, Mohamad Rushdan Md Said
    MyJurnal
    Elliptic curve cryptosystems (ECC) provides better security for each bit key utilized compared to the RSA cryptosystem. For this reason, it is projected to have more practical usage than the RSA. In ECC, scalar multiplication (or point multiplication) is the dominant operation, namely, computing nP from a point P on an elliptic curve, where n is an integer defined as the point resulting from adding P + P + ... + P, n times. However, for practical uses, it is very important to improve the efficiency of the scalar multiplication. Solinas (1997) proposes that the τ-adic Non-Adjacent Form (τ-NAF) is one of the most efficient algorithms used to compute scalar multiplications on Anomalous Binary curves. In this paper, we give a new property (i.e., Theorem 1.2) of τ-NAF(n) representation for every length, l. This is useful for evaluating the maximum and minimum norms occurring among all length-l elements of Z(τ). We also propose a new cryptographic method by using randomization of a multiplier n to nr an element of Z(τ). It is based on τ-NAF. We focused on estimating the length of RTNAF(nr) expansion by using a new method.
Related Terms
Filters
Contact Us

Please provide feedback to Administrator (afdal@afpm.org.my)

External Links