{"id":"https://openalex.org/W4392956619","doi":"https://doi.org/10.3390/cryptography8010011","title":"Lookup Table-Based Design of Scalar Multiplication for Elliptic Curve Cryptography","display_name":"Lookup Table-Based Design of Scalar Multiplication for Elliptic Curve Cryptography","publication_year":2024,"publication_date":"2024-03-18","ids":{"openalex":"https://openalex.org/W4392956619","doi":"https://doi.org/10.3390/cryptography8010011"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography8010011","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography8010011","pdf_url":"https://www.mdpi.com/2410-387X/8/1/11/pdf?version=1710840184","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/8/1/11/pdf?version=1710840184","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5094192231","display_name":"Yan-Duan Ning","orcid":null},"institutions":[{"id":"https://openalex.org/I4387154394","display_name":"National Kaohsiung University of Science and Technology","ror":"https://ror.org/00hfj7g70","country_code":null,"type":"education","lineage":["https://openalex.org/I4387154394"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Yan-Duan Ning","raw_affiliation_strings":["Department of Electronic Engineering, National Kaohsiung University of Science and Technology, Kaohsiung 807618, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering, National Kaohsiung University of Science and Technology, Kaohsiung 807618, Taiwan","institution_ids":["https://openalex.org/I4387154394"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053712642","display_name":"Yan\u2010Haw Chen","orcid":"https://orcid.org/0000-0002-2579-4754"},"institutions":[{"id":"https://openalex.org/I98298690","display_name":"I-Shou University","ror":"https://ror.org/04d7e4m76","country_code":"TW","type":"education","lineage":["https://openalex.org/I98298690"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Yan-Haw Chen","raw_affiliation_strings":["Department of Information Engineering, I-Shou University, Kaohsiung 840301, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering, I-Shou University, Kaohsiung 840301, Taiwan","institution_ids":["https://openalex.org/I98298690"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102573495","display_name":"Cheng-Sin Shih","orcid":null},"institutions":[{"id":"https://openalex.org/I4387154394","display_name":"National Kaohsiung University of Science and Technology","ror":"https://ror.org/00hfj7g70","country_code":null,"type":"education","lineage":["https://openalex.org/I4387154394"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Cheng-Sin Shih","raw_affiliation_strings":["Department of Electronic Engineering, National Kaohsiung University of Science and Technology, Kaohsiung 807618, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering, National Kaohsiung University of Science and Technology, Kaohsiung 807618, Taiwan","institution_ids":["https://openalex.org/I4387154394"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082125700","display_name":"Shao\u2010I Chu","orcid":"https://orcid.org/0000-0003-2651-2357"},"institutions":[{"id":"https://openalex.org/I4387154394","display_name":"National Kaohsiung University of Science and Technology","ror":"https://ror.org/00hfj7g70","country_code":null,"type":"education","lineage":["https://openalex.org/I4387154394"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Shao-I Chu","raw_affiliation_strings":["Department of Electronic Engineering, National Kaohsiung University of Science and Technology, Kaohsiung 807618, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering, National Kaohsiung University of Science and Technology, Kaohsiung 807618, Taiwan","institution_ids":["https://openalex.org/I4387154394"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5082125700"],"corresponding_institution_ids":["https://openalex.org/I4387154394"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":2.9992,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.91883546,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":"8","issue":"1","first_page":"11","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9807000160217285,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9753999710083008,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalar-multiplication","display_name":"Scalar multiplication","score":0.8039506673812866},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.7175506949424744},{"id":"https://openalex.org/keywords/elliptic-curve-digital-signature-algorithm","display_name":"Elliptic Curve Digital Signature Algorithm","score":0.6506959795951843},{"id":"https://openalex.org/keywords/lookup-table","display_name":"Lookup table","score":0.5935980081558228},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.5434517860412598},{"id":"https://openalex.org/keywords/elliptic-curve","display_name":"Elliptic curve","score":0.5419100522994995},{"id":"https://openalex.org/keywords/table","display_name":"Table (database)","score":0.49923110008239746},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.48491960763931274},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.48294228315353394},{"id":"https://openalex.org/keywords/scalar","display_name":"Scalar (mathematics)","score":0.4617680609226227},{"id":"https://openalex.org/keywords/elliptic-curve-point-multiplication","display_name":"Elliptic curve point multiplication","score":0.4117029905319214},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3749460279941559},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2507609724998474},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.21383920311927795},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.14323869347572327},{"id":"https://openalex.org/keywords/pure-mathematics","display_name":"Pure mathematics","score":0.14199432730674744},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1328044831752777},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.13004425168037415},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12059548497200012},{"id":"https://openalex.org/keywords/geometry","display_name":"Geometry","score":0.11433351039886475}],"concepts":[{"id":"https://openalex.org/C171182647","wikidata":"https://www.wikidata.org/wiki/Q126736","display_name":"Scalar multiplication","level":3,"score":0.8039506673812866},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.7175506949424744},{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.6506959795951843},{"id":"https://openalex.org/C134835016","wikidata":"https://www.wikidata.org/wiki/Q690265","display_name":"Lookup table","level":2,"score":0.5935980081558228},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.5434517860412598},{"id":"https://openalex.org/C179603306","wikidata":"https://www.wikidata.org/wiki/Q268493","display_name":"Elliptic curve","level":2,"score":0.5419100522994995},{"id":"https://openalex.org/C45235069","wikidata":"https://www.wikidata.org/wiki/Q278425","display_name":"Table (database)","level":2,"score":0.49923110008239746},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.48491960763931274},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.48294228315353394},{"id":"https://openalex.org/C57691317","wikidata":"https://www.wikidata.org/wiki/Q1289248","display_name":"Scalar (mathematics)","level":2,"score":0.4617680609226227},{"id":"https://openalex.org/C117121985","wikidata":"https://www.wikidata.org/wiki/Q78380999","display_name":"Elliptic curve point multiplication","level":3,"score":0.4117029905319214},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3749460279941559},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2507609724998474},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.21383920311927795},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.14323869347572327},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.14199432730674744},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1328044831752777},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.13004425168037415},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12059548497200012},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.11433351039886475}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography8010011","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography8010011","pdf_url":"https://www.mdpi.com/2410-387X/8/1/11/pdf?version=1710840184","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:4170d6d2e13d40b09139bb6c77932140","is_oa":true,"landing_page_url":"https://doaj.org/article/4170d6d2e13d40b09139bb6c77932140","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 8, Iss 1, p 11 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography8010011","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography8010011","pdf_url":"https://www.mdpi.com/2410-387X/8/1/11/pdf?version=1710840184","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320322795","display_name":"Ministry of Science and Technology, Taiwan","ror":"https://ror.org/02kv4zf79"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4392956619.pdf"},"referenced_works_count":17,"referenced_works":["https://openalex.org/W1584722274","https://openalex.org/W1889596231","https://openalex.org/W2036378739","https://openalex.org/W2253064441","https://openalex.org/W2475786860","https://openalex.org/W2611487319","https://openalex.org/W2885098807","https://openalex.org/W2920669275","https://openalex.org/W2995144174","https://openalex.org/W3039308597","https://openalex.org/W3125524301","https://openalex.org/W3126560502","https://openalex.org/W3159698558","https://openalex.org/W3190004108","https://openalex.org/W4205466443","https://openalex.org/W4244077179","https://openalex.org/W4389161258"],"related_works":["https://openalex.org/W1521649858","https://openalex.org/W2356198393","https://openalex.org/W2388837654","https://openalex.org/W2182900437","https://openalex.org/W2082118750","https://openalex.org/W3172178782","https://openalex.org/W2729640778","https://openalex.org/W2161958080","https://openalex.org/W2373256444","https://openalex.org/W2620257839"],"abstract_inverted_index":{"This":[0],"paper":[1,61],"is":[2,44,62,93,192],"aimed":[3],"at":[4],"using":[5,188],"a":[6,52,120],"lookup":[7,21,211],"table":[8,22],"method":[9,92,191],"to":[10,67,107],"improve":[11,78,147],"the":[12,79,89,96,99,108,112,116,126,136,148,157,163,166,170,178,185,189,198,209,223],"scalar":[13,186],"multiplication":[14,55,187],"performance":[15,149],"of":[16,33,54,59,82,98,122,150,156,184,206],"elliptic":[17],"curve":[18],"cryptography.":[19],"The":[20,57,181],"must":[23,104],"be":[24,105,215],"divided":[25],"into":[26],"two":[27,31],"polynomials":[28],"and":[29,76,142,219,229],"requires":[30,51,119],"iterations":[32],"point":[34,159],"doubling":[35,160],"operation,":[36,102],"for":[37,73,217],"which":[38],"negation":[39],"operations":[40,81,226],"are":[41,65,227,230],"needed.":[42],"It":[43],"well":[45],"known":[46],"that":[47,63],"an":[48,203],"inversion":[49],"operation":[50,128,161],"lot":[53,121],"time.":[56],"advantage":[58],"this":[60,74],"we":[64],"able":[66],"reduce":[68],"one":[69],"inverse":[70,100,151],"element":[71,101,152],"calculation":[72],"problem":[75],"also":[77,134],"basic":[80],"finite":[83],"fields":[84],"through":[85,111],"segmentation":[86],"methods.":[87],"If":[88],"normal":[90,109],"basis":[91,110],"used":[94],"in":[95,162,232],"design":[97],"it":[103,133],"converted":[106],"standard":[113],"basis.":[114],"However,":[115],"conversion":[117],"process":[118],"matrix":[123],"operations.":[124,153],"Though":[125],"anti-element":[127],"has":[129],"good":[130],"speed":[131],"performance,":[132],"increases":[135],"computational":[137,182],"complexity.":[138],"Using":[139],"number":[140],"theory":[141],"grouping":[143],"methods":[144],"will":[145],"greatly":[146],"With":[154],"application":[155],"two-time":[158],"hardware":[164,220],"implementation,":[165,221],"developed":[167,224],"approach":[168],"reduces":[169],"computing":[171],"time":[172,183],"by":[173,195],"48%":[174],"as":[175,222],"compared":[176],"with":[177,201],"conventional":[179],"approach.":[180],"presented":[190],"further":[193],"improved":[194],"67%":[196],"over":[197],"traditional":[199],"algorithm":[200],"only":[202],"area":[204],"increase":[205],"12%.":[207],"Finally,":[208],"proposed":[210],"table-based":[212],"technique":[213],"can":[214],"utilized":[216],"software":[218],"arithmetic":[225],"simple":[228],"consistent":[231],"their":[233],"execution.":[234]},"counts_by_year":[{"year":2025,"cited_by_count":4}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
