Open Access
Subscription Access
Survey of Elliptic Curve Scalar Multiplication Algorithms
The standard bodies accepted elliptic curve cryptography as an efficient and alternative public key cryptosystem for the next generation cryptographic applications. The most dominant operation in this cryptosystem is the scalar multiplication. In this paper, we study various scalar multiplication algorithms with respect to the efficiency, average hamming weight and memory requirements etc. This paper gives an idea and the areas for which the researchers can proceed further.
Keywords
Elliptic Curve Cryptography, Binary Method, Non-Adjacent form, Scalar Multiplication.
User
Font Size
Information
Abstract Views: 157
PDF Views: 4