Aspects of hyperelliptic curves over large prime fields in software implementations

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

Department of Electrical Engineering and Information Sciences Ruhr University of Bochum, Universitätsstraβe 150, D-44780 Bochum, Germany We present an implementation of elliptic curves and of hyperelliptic curves of genus 2 and 3 over prime fields. To achieve a fair comparison between the different types of groups, we developed an ad-hoc arithmetic library, designed to remove most of the overheads that penalize implementations of curve-based cryptography over prime fields. These overheads get worse for smaller fields, and thus for larger genera for a fixed group size. We also use techniques for delaying modular reductions to reduce the amount of modular reductions in the formulae for the group operations. The result is that the performance of hyperelliptic curves of genus 2 over prime fields is much closer to the performance of elliptic curves than previously thought. For groups of 192 and 256 bits the difference is about 14% and 15% respectively.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
EditorsMarc Joye, Jean-Jacques Quisquater
PublisherSpringer Verlag
Pages148-162
Number of pages15
ISBN (Print)3540226664, 9783540226666
DOIs
StatePublished - 2004
Externally publishedYes

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3156
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Keywords

  • Cryptography
  • Efficient implementation
  • Elliptic and hyperelliptic curves
  • Lazy and incomplete modular reduction
  • Prime field arithmetic

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Aspects of hyperelliptic curves over large prime fields in software implementations'. Together they form a unique fingerprint.

Cite this