A hardware-oriented algorithm for computing in Jacobians and its implementation for hyperelliptic curve cryptosystems

Tetsuya Tamura, Kouichi Sakurai, Tsutomu Matsumoto

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, we present algorithms, suitable for hardware implementation, for computation in the Jacobian of a hyperelliptic curve defined over GF(2n). We take curves of genus 3 and 6, designed by using 0.27- um CMOS gate array technology, and estimate the number of multiplication operations and the size and speed of hardware based on the proposed algorithm. It is shown that hardware for genus 6 curves computes an addition (resp. doubling) operation in 100 (resp. 29) clock cycles and can work at clock frequencies of up to 83 MHz We also compare a hyperelliptic curve cryptosystem with RSA and elliptic curve cryptosystems from the viewpoint of hardware implementation.

Original languageEnglish
Title of host publicationInformation Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings
EditorsJooSeok Song
PublisherSpringer Verlag
Pages221-235
Number of pages15
ISBN (Print)3540673806, 9783540673804
DOIs
Publication statusPublished - Jan 1 2000
Event2nd International Conference on Information Security and Cryptology, ICISC 1999 - Seoul, Korea, Republic of
Duration: Dec 9 1999Dec 10 1999

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1787
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other2nd International Conference on Information Security and Cryptology, ICISC 1999
CountryKorea, Republic of
CitySeoul
Period12/9/9912/10/99

    Fingerprint

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Tamura, T., Sakurai, K., & Matsumoto, T. (2000). A hardware-oriented algorithm for computing in Jacobians and its implementation for hyperelliptic curve cryptosystems. In J. Song (Ed.), Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings (pp. 221-235). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 1787). Springer Verlag. https://doi.org/10.1007/10719994_18