A hardware-oriented algorithm for computing in Jacobians and its implementation for hyperelliptic curve cryptosystems

Tetsuya Tamura, Kouichi Sakurai, Tsutomu Matsumoto

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, we present algorithms, suitable for hardware implementation, for computation in the Jacobian of a hyperelliptic curve defined over GF(2n). We take curves of genus 3 and 6, designed by using 0.27- um CMOS gate array technology, and estimate the number of multiplication operations and the size and speed of hardware based on the proposed algorithm. It is shown that hardware for genus 6 curves computes an addition (resp. doubling) operation in 100 (resp. 29) clock cycles and can work at clock frequencies of up to 83 MHz We also compare a hyperelliptic curve cryptosystem with RSA and elliptic curve cryptosystems from the viewpoint of hardware implementation.

Original languageEnglish
Title of host publicationInformation Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings
EditorsJooSeok Song
PublisherSpringer Verlag
Pages221-235
Number of pages15
ISBN (Print)3540673806, 9783540673804
DOIs
Publication statusPublished - Jan 1 2000
Event2nd International Conference on Information Security and Cryptology, ICISC 1999 - Seoul, Korea, Republic of
Duration: Dec 9 1999Dec 10 1999

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1787
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other2nd International Conference on Information Security and Cryptology, ICISC 1999
Country/TerritoryKorea, Republic of
CitySeoul
Period12/9/9912/10/99

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'A hardware-oriented algorithm for computing in Jacobians and its implementation for hyperelliptic curve cryptosystems'. Together they form a unique fingerprint.

Cite this