The mpFq library and implementing curve-based key exchanges. We present a library for finite field arithmetic. The originality of this library lies in the fact that specialized code is automatically produced for the selected finite fields. The opportunity of compile-time optimizations yields substantial performance improvements compared to libraries which initialize the finite field at runtime. This library is used to present benchmarks on some curve-based public key cryptosystems.

References in zbMATH (referenced in 13 articles )

Showing results 1 to 13 of 13.
Sorted by year (citations)

  1. Bos, Joppe W.; Costello, Craig; Hisil, Huseyin; Lauter, Kristin: Fast cryptography in genus 2 (2016)
  2. Faz-Hernández, Armando; Longa, Patrick; Sánchez, Ana H.: Efficient and secure algorithms for GLV-based scalar multiplication and their implementation on GLV-GLS curves (2014)
  3. Bernstein, Daniel J.; Birkner, Peter; Lange, Tanja; Peters, Christiane: ECM using Edwards curves (2013)
  4. Bos, Joppe W.; Costello, Craig; Hisil, Huseyin; Lauter, Kristin: Fast cryptography in genus 2 (2013)
  5. Granger, Robert; Moss, Andrew: Generalised Mersenne numbers revisited (2013)
  6. Aranha, Diego F.; Faz-Hernández, Armando; López, Julio; Rodríguez-Henríquez, Francisco: Faster implementation of scalar multiplication on Koblitz curves (2012)
  7. Gaudry, Pierrick; Schost, Éric: Genus 2 point counting over prime fields (2012)
  8. Galbraith, Steven D.; Lin, Xibin; Scott, Michael: Endomorphisms for faster elliptic curve cryptography on a large class of curves (2011)
  9. Aranha, Diego F.; López, Julio; Hankerson, Darrel: Efficient software implementation of binary field arithmetic using vector instruction sets (2010)
  10. Costigan, Neil; Schwabe, Peter: Fast elliptic-curve cryptography on the cell broadband engine (2009)
  11. Ding, Ling; Schost, Éric: Code generation for polynomial multiplication (2009)
  12. Gaudry, Pierrick; Lubicz, David: The arithmetic of characteristic 2 Kummer surfaces and of elliptic Kummer lines (2009)
  13. Szerwinski, Robert; Güneysu, Tim: Exploiting the power of GPUs for asymmetric cryptography (2008)