{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T17:06:26Z","timestamp":1749143186491},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,9,4]],"date-time":"2014-09-04T00:00:00Z","timestamp":1409788800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1007\/s13389-014-0085-7","type":"journal-article","created":{"date-parts":[[2014,9,3]],"date-time":"2014-09-03T04:56:47Z","timestamp":1409720207000},"page":"31-52","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Efficient and secure algorithms for GLV-based scalar multiplication and their implementation on GLV\u2013GLS curves (extended version)"],"prefix":"10.1007","volume":"5","author":[{"given":"Armando","family":"Faz-Hern\u00e1ndez","sequence":"first","affiliation":[]},{"given":"Patrick","family":"Longa","sequence":"additional","affiliation":[]},{"given":"Ana H.","family":"S\u00e1nchez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,9,4]]},"reference":[{"key":"85_CR1","doi-asserted-by":"crossref","unstructured":"Aranha, D.F., Karabina, K., Longa, P., Gebotys, C.H., L\u00f3pez, J.: Faster explicit formulas for computing pairings over ordinary curves. In: Paterson, K.G. (ed.) Advances in cryptology, EUROCRYPT, vol. 6632, pp 48\u201368. Springer, New York (2011)","DOI":"10.1007\/978-3-642-20465-4_5"},{"key":"85_CR2","unstructured":"Bernstein, D.: Cache-timing attacks on AES. http:\/\/cr.yp.to\/antiforgery\/cachetiming-20050414.pdf (2005)"},{"key":"85_CR3","doi-asserted-by":"crossref","unstructured":"Bernstein, D., Birkner, P., Joye, M., Lange, T., Peters, C.: Twisted Edwards curves. In: Vaudenay, S., (ed.) Proceedings of Africacrypt 2008 LNCS, vol. 5023, pp. 389\u2013405. Springer, New York (2008)","DOI":"10.1007\/978-3-540-68164-9_26"},{"key":"85_CR4","unstructured":"Bernstein, D., Chuengsatiansup, C., Lange, T., Schwabe, P.: Kummer strikes back: new DH speed records. In: Cryptology ePrint Archive, Report 2014\/134 (2014). Available at: http:\/\/eprint.iacr.org\/2014\/134"},{"key":"85_CR5","doi-asserted-by":"crossref","unstructured":"Bernstein, D., Duif, N., Lange, T., Schwabe, P., Yang, B.-Y.: High-speed high-security signatures. In: Preneel, B., Takagi, T. (eds.) Proceedings of CHES 2011, LNCS, vol. 6917, pp. 124\u2013142. Springer, New York (2011)","DOI":"10.1007\/978-3-642-23951-9_9"},{"key":"85_CR6","unstructured":"Bernstein, D., Lange, T.: eBACS: ECRYPT Benchmarking of Cryptographic Systems. http:\/\/bench.cr.yp.to\/results-dh.html (2013). Accessed 12 Dec 2013"},{"key":"85_CR7","doi-asserted-by":"crossref","unstructured":"Bernstein, D., Schwabe, P.: NEON crypto. In: Prouff, E., Schaumont, P.R. (eds.) Cryptographic Hardware and Embedded Systems, CHES 2012, Lecture Notes in Computer Science, vol. 7428, pp. 320\u2013339. Springer, New York (2012)","DOI":"10.1007\/978-3-642-33027-8_19"},{"key":"85_CR8","doi-asserted-by":"crossref","unstructured":"Bos, J.W., Costello, C., Hisil, H., Lauter, K.: Fast cryptography in genus 2. In: Johansson, T., Nguyen, P.Q. (eds.) Advances in Crytology, EUROCRYPT, LNCS, vol. 7881, pp. 194\u2013210. Springer, New York (2013)","DOI":"10.1007\/978-3-642-38348-9_12"},{"key":"85_CR9","doi-asserted-by":"crossref","unstructured":"Bos, J.W., Costello, C., Hisil, H., Lauter, K.: High-performance scalar multiplication using 8-dimensional GLV\/GLS decomposition. In: Bertoni, G., Coron, J.-S. (eds.) Cryptographic Hardware and Embedded Systems, CHES 2013, LNCS, vol. 8086, pp. 331\u2013348. Springer, New York (2013)","DOI":"10.1007\/978-3-642-40349-1_19"},{"key":"85_CR10","unstructured":"Bos, J.W., Costello, C., Longa, P., Naehrig, M.: Selecting elliptic curves for cryptography: an efficiency and security analysis. In: Proceedings of Cryptology ePrint Archive, Report 2014\/130 (2014). Available at: http:\/\/eprint.iacr.org\/2014\/130"},{"key":"85_CR11","unstructured":"Brumley, D., Boneh, D.: Remote timing attacks are practical. In: Mangard, S., Standaert, F.-X. (eds.) Proceedings of the 12th USENIX Security Symposium, LNCS, vol. 6225, pp. 80\u201394. Springer, New York (2003)"},{"key":"85_CR12","doi-asserted-by":"crossref","unstructured":"Faz-Hern\u00e1ndez, A., Longa, P., S\u00e1nchez, A.H.: Efficient and secure algorithms for GLV-based scalar multiplication and their implementation on GLV-GLS curves. In: Benaloh, J. (ed.) Topics in Cryptology, CT-RSA 2014, vol. 8366, pp. 1\u201327. Springer, New York (2014)","DOI":"10.1007\/978-3-319-04852-9_1"},{"key":"85_CR13","unstructured":"Feng, M., Zhu, B.B. Xu, M., Li, S.: Efficient comb elliptic curve multiplication methods resistant to power analysis. In: Proceedings of Cryptology ePrint Archive, Report 2005\/222 (2005). Available at: http:\/\/eprint.iacr.org\/2005\/222"},{"key":"85_CR14","doi-asserted-by":"crossref","unstructured":"Feng, M., Zhu, B.B., Zhao, C., Li, S.: Signed MSB-set comb method for elliptic curve point multiplication. In: Chen, K., Deng, R., Lai, X., Zhou, J. (eds) Proceedings of Information Security Practice and Experience (ISPEC 2006), LNCS, vol. 3903, pp. 13\u201324. Springer, New York (2006)","DOI":"10.1007\/11689522_2"},{"issue":"3","key":"85_CR15","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1007\/s00145-010-9065-y","volume":"24","author":"SD Galbraith","year":"2011","unstructured":"Galbraith, S.D., Lin, X., Scott, M.: Endomorphisms for faster elliptic curve cryptography on a large class of curves. J. Cryptol. 24(3), 446\u2013469 (2011)","journal-title":"J. Cryptol."},{"key":"85_CR16","doi-asserted-by":"crossref","unstructured":"Galbraith, S.D., Lin, X., Scott, M.: Endomorphisms for faster elliptic curve cryptography on a large class of curves. In: Joux, A. (ed.) Advances in Cryptology, EUROCRYPT, LNCS, vol. 5479, pp. 518\u2013535. Springer, New York (2009)","DOI":"10.1007\/978-3-642-01001-9_30"},{"key":"85_CR17","doi-asserted-by":"crossref","unstructured":"Gallant, R.P., Lambert, J.L., Vanstone, S.A.: Faster point multiplication on elliptic curves with efficient endomorphisms. In: Kilian, J. (ed.) Advances in Cryptology, CRYPTO, LNCS, vol. 2139, pp. 190\u2013200. Springer, New York (2001)","DOI":"10.1007\/3-540-44647-8_11"},{"key":"85_CR18","doi-asserted-by":"crossref","unstructured":"Guillevic, A., Ionica, S.: Four dimensional GLV via the weil restriction. In: Sako, K., Sarkar, P. (eds.) Advances in Cryptology, ASIACRYPT, LNCS, vol. 8269, pp. 79\u201396. Springer, New York (2013)","DOI":"10.1007\/978-3-642-42033-7_5"},{"key":"85_CR19","unstructured":"Hamburg, M.: Fast and compact elliptic-curve cryptography. In: Proceedings of Cryptology ePrint Archive, Report 2012\/309 (2012). Available at: http:\/\/eprint.iacr.org\/2012\/309"},{"issue":"10","key":"85_CR20","doi-asserted-by":"crossref","first-page":"1411","DOI":"10.1109\/TC.2009.61","volume":"58","author":"D Hankerson","year":"2009","unstructured":"Hankerson, D., Karabina, K., Menezes, A.: Analyzing the Galbraith\u2013Lin\u2013Scott point multiplication method for elliptic curves over binary fields. IEEE Trans. Comput. 58(10), 1411\u20131420 (2009)","journal-title":"IEEE Trans. Comput."},{"key":"85_CR21","unstructured":"Hankerson, D., Menezes, A., Vanstone, S.: Guide to elliptic curve cryptography. Springer, New York (2004)"},{"key":"85_CR22","doi-asserted-by":"crossref","unstructured":"Hedabou, M., Pinel, P., Beneteau, L.: Countermeasures for preventing comb method against SCA attacks. In: Deng, R., Bao, F., Pang, H., Zhou, J. (eds.) Proceedings of Information Security Practice and Experience (ISPEC 2005), LNCS, vol. 3439, pp. 85\u201396. Springer, New York (2005)","DOI":"10.1007\/978-3-540-31979-5_8"},{"key":"85_CR23","doi-asserted-by":"crossref","unstructured":"Hisil, H., Wong, K., Carter, G., Dawson, E.: Twisted Edwards curves revisited. In: Pieprzyk, J. (ed.) Advances in Cryptology, ASIACRYPT, LNCS, vol. 5350, pp. 326\u2013343. Springer, New York (2008)","DOI":"10.1007\/978-3-540-89255-7_20"},{"key":"85_CR24","doi-asserted-by":"crossref","unstructured":"Hu, Z., Longa, P., Xu, M.: Implementing 4-dimensional GLV method on GLS elliptic curves with j-invariant 0. Des. Codes Cryptogr. 63(3), 331\u2013343 (2012). http:\/\/eprint.iacr.org\/2011\/315","DOI":"10.1007\/s10623-011-9558-1"},{"key":"85_CR25","doi-asserted-by":"crossref","unstructured":"Joye, M., Tunstall, M.: Exponent recoding and regular exponentiation algorithms. In: Joye, M., (ed.) Proceedings of Africacrypt 2003, LNCS, vol. 5580, pp. 334\u2013349. Springer, New York (2009)","DOI":"10.1007\/978-3-642-02384-2_21"},{"key":"85_CR26","doi-asserted-by":"crossref","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie\u2013Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) Advances in Cryptology, CRYPTO, LNCS, vol. 1109, pp. 104\u2013113. Springer, New York (1996)","DOI":"10.1007\/3-540-68697-5_9"},{"key":"85_CR27","doi-asserted-by":"crossref","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) Advances in Cryptology, CRYPTO, LNCS, vol. 1666, pp. 388\u2013397. Springer, New York (1999)","DOI":"10.1007\/3-540-48405-1_25"},{"key":"85_CR28","doi-asserted-by":"crossref","unstructured":"Lim, C.H., Lee, P.J.: More flexible exponentiation with precomputation. In: Desmedt, Y. (ed.) Advances in Cryptology, CRYPTO, LNCS, vol. 839, pp. 95\u2013107. Springer, New York (1994)","DOI":"10.1007\/3-540-48658-5_11"},{"key":"85_CR29","unstructured":"ARM Limited. ARM Architecture Reference Manual: ARMv7-A and ARMv7-R (edn.) (2012)"},{"key":"85_CR30","doi-asserted-by":"crossref","unstructured":"Longa, P., Gebotys, C.: Efficient techniques for high-speed elliptic curve cryptography. In Mangard, S., Standaert, F.-X. (eds.) Proceedings of CHES 2010, LNCS, vol. 6225, pp. 80\u201394. Springer, New York (2010)","DOI":"10.1007\/978-3-642-15031-9_6"},{"key":"85_CR31","doi-asserted-by":"crossref","unstructured":"Longa, P., Sica, F.: Four-dimensional Gallant\u2013Lambert\u2013Vanstone scalar multiplication. In: Wang, X., Sako, K. (eds.) Advances in Cryptology, ASIACRYPT, LNCS, vol. 7658, pp. 718\u2013739. Springer, New York (2012)","DOI":"10.1007\/978-3-642-34961-4_43"},{"issue":"2","key":"85_CR32","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1007\/s00145-012-9144-3","volume":"27","author":"P Longa","year":"2014","unstructured":"Longa, P., Sica, F.: Four-dimensional Gallant\u2013Lambert\u2013Vanstone scalar multiplication. J. Cryptol. 27(2), 248\u2013283 (2014)","journal-title":"J. Cryptol."},{"key":"85_CR33","doi-asserted-by":"crossref","unstructured":"M\u00f6ller, B.: Algorithms for multi-exponentiation. In: Vaudenay, S., Youssef, A.M. (eds.) Proceedings of SAC 2001, LNCS, vol. 2259, pp. 165\u2013180. Springer, New York (2001)","DOI":"10.1007\/3-540-45537-X_13"},{"key":"85_CR34","doi-asserted-by":"crossref","unstructured":"Okeya, K., Takagi, T.: The width- $$w$$ w NAF method provides small memory and fast elliptic curve scalars multiplications against side-channel attacks. In: Joye, M. (ed.) Proceedings of CT-RSA 2003, vol. 2612, pp. 328\u2013342. Springer, New York (2003)","DOI":"10.1007\/3-540-36563-X_23"},{"key":"85_CR35","doi-asserted-by":"crossref","unstructured":"Oliveira, T., L\u00f3pez, J., Aranha, D.F., Rodr\u00edguez-Henr\u00edquez, F.: Lambda coordinates for binary elliptic curves. In: Bertoni, G., Coron, J.-S. (eds.) Cryptographic Hardware and Embedded Systems, CHES 2013, LNCS, vol. 8086, pp. 311\u2013330. Springer, New York (2013)","DOI":"10.1007\/978-3-642-40349-1_18"},{"key":"85_CR36","doi-asserted-by":"crossref","unstructured":"Osvik, D.A., Shamir, A., Tromer, E.: Cache attacks and countermeasures: the case of AES. In: Pointcheval, D. (ed.) Topics in Cryptology, CT-RSA 2006, vol. 3860, pp. 1\u201320. Springer, New York (2006)","DOI":"10.1007\/11605805_1"},{"key":"85_CR37","unstructured":"Microsoft Research. MSR Elliptic Curve Cryptography Library (MSR ECCLib) (2014). Available at: http:\/\/research.microsoft.com\/en-us\/projects\/nums"},{"key":"85_CR38","doi-asserted-by":"crossref","unstructured":"S\u00e1nchez, A.H., Rodr\u00edguez-Henr\u00edquez, F.: NEON implementation of an attribute-based encryption scheme. In: Jacobson, M., Locasto, M., Mohassel, P., Safavi-Naini, R. (eds.) International Conference on Applied Cryptography and Network Security, ACNS 2013, LNCS, vol. 7954, pp. 322\u2013338. Springer, New York (2013)","DOI":"10.1007\/978-3-642-38980-1_20"},{"key":"85_CR39","doi-asserted-by":"crossref","unstructured":"Smith, B.: Families of fast elliptic curves from $$\\mathbb{Q}$$ Q -curves. In: Sako, K., Sarkar, P. (eds.) Advances in Cryptology, ASIACRYPT, LNCS, vol. 8269, pp. 61\u201378. Springer, New York (2013)","DOI":"10.1007\/978-3-642-42033-7_4"},{"key":"85_CR40","doi-asserted-by":"crossref","unstructured":"Weber, D., Denny, T.F.: The solution of McCurley\u2019s discrete log challenge. In: Krawczyk, H. (ed.) Advances in Cryptology, CRYPTO, LNCS, vol. 1462, pp. 458\u2013471. Springer, New York (1998)","DOI":"10.1007\/BFb0055747"},{"issue":"2","key":"85_CR41","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1049\/ip-cdt:20020235","volume":"149","author":"T Yanik","year":"2002","unstructured":"Yanik, T., Sava\u015f, E., Ko\u00e7, \u00c7.K.: Incomplete reduction in modular arithmetic. IEE Proc. Comput. Digital Tech. 149(2), 46\u201352 (2002)","journal-title":"IEE Proc. Comput. Digital Tech."},{"issue":"9","key":"85_CR42","doi-asserted-by":"crossref","first-page":"967","DOI":"10.1109\/12.869328","volume":"49","author":"S-M Yen","year":"2000","unstructured":"Yen, S.-M., Joye, M.: Checking before output may not be enough against fault-based cryptanalysis. IEEE Trans. Comput. 49(9), 967\u2013970 (2000)","journal-title":"IEEE Trans. Comput."},{"key":"85_CR43","doi-asserted-by":"crossref","unstructured":"Yen, S.-M., Kim, S., Lim, S., Moon, S.-J.: A countermeasure against one physical cryptanalysis may benefit another attack. In: Kim, K., (ed.) Information Security and Cryptology, ICISC 2001, Lecture Notes in Computer Science, vol. 2288, pp. 414\u2013427. Springer, New York (2002)","DOI":"10.1007\/3-540-45861-1_31"}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-014-0085-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13389-014-0085-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-014-0085-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,16]],"date-time":"2022-04-16T05:06:20Z","timestamp":1650085580000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13389-014-0085-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,4]]},"references-count":43,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,4]]}},"alternative-id":["85"],"URL":"https:\/\/doi.org\/10.1007\/s13389-014-0085-7","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"value":"2190-8508","type":"print"},{"value":"2190-8516","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,9,4]]}}}