2,849 research outputs found
Combined small subgroups and side-channel attack on elliptic curves with cofactor divisible by
Nowadays, alternative models of elliptic curves like Montgomery, Edwards, twisted Edwards, Hessian, twisted Hessian, Huff's curves and many others are very popular and many people use them in cryptosystems which are based on elliptic curve cryptography. Most of these models allow to use fast and complete arithmetic which is especially convenient in fast implementations that are side-channel attacks resistant. Montgomery, Edwards and twisted Edwards curves have always order of group of rational points divisible by 4. Huff's curves have always order of rational points divisible by 8. Moreover, sometimes to get fast and efficient implementations one can choose elliptic curve with even bigger cofactor, for example 16. Of course the bigger cofactor is, the smaller is the security of cryptosystem which uses such elliptic curve. In this article will be checked what influence on the security has form of cofactor of elliptic curve and will be showed that in some situations elliptic curves with cofactor divisible by are vulnerable for combined small subgroups and side-channel attacks
The geometry of efficient arithmetic on elliptic curves
The arithmetic of elliptic curves, namely polynomial addition and scalar
multiplication, can be described in terms of global sections of line bundles on
and , respectively, with respect to a given projective embedding
of in . By means of a study of the finite dimensional vector
spaces of global sections, we reduce the problem of constructing and finding
efficiently computable polynomial maps defining the addition morphism or
isogenies to linear algebra. We demonstrate the effectiveness of the method by
improving the best known complexity for doubling and tripling, by considering
families of elliptic curves admiting a -torsion or -torsion point
- …