Peter Birkner
Eindhoven University of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Peter Birkner.
international conference on progress in cryptology | 2007
Daniel J. Bernstein; Peter Birkner; Tanja Lange; Cp Christiane Peters
This paper analyzes the best speeds that can be obtained for single-scalar multiplication with variable base point by combining a huge range of options: - many choices of coordinate systems and formulas for individual group operations, including new formulas for tripling on Edwards curves; - double-base chains with many different doubling/tripling ratios, including standard base-2 chains as an extreme case; - many precomputation strategies, going beyond Dimitrov, Imbert, Mishra (Asiacrypt 2005) and Doche and Imbert (Indocrypt 2006). The analysis takes account of speedups such as S - M tradeoffs and includes recent advances such as inverted Edwards coordinates. The main conclusions are as follows. Optimized precomputations and triplings save time for single-scalar multiplication in Jacobian coordinates, Hessian curves, and tripling-oriented Doche/Icart/Kohel curves. However, even faster single-scalar multiplication is possible in Jacobi intersections, Edwards curves, extended Jacobi-quartic coordinates, and inverted Edwards coordinates, thanks to extremely fast doublings and additions; there is no evidence that double-base chains are worthwhile for the fastest curves. Inverted Edwards coordinates are the speed leader.
Mathematics of Computation | 2012
Daniel J. Bernstein; Peter Birkner; Tanja Lange; Cp Christiane Peters
This paper introduces EECM-MPFQ, a fast implementation of the elliptic-curve method of factoring integers. EECM-MPFQ uses fewer modular multiplications than the well-known GMP-ECM software, takes less time than GMP-ECM, and finds more primes than GMP-ECM. The main improvements above the modular-arithmetic level are as follows: (1) use Edwards curves instead of Montgomery curves; (2) use extended Edwards coordinates; (3) use signed-sliding-window addition-subtraction chains; (4) batch primes to increase the window size; (5) choose curves with small parameters and base points; (6) choose curves with large torsion.
selected areas in cryptography | 2009
Peter Birkner; Nicolas Thériault
We study divisor class halving for hyperelliptic curves of genus 2 over binary fields. We present explicit halving formulas for the most interesting curves (from a cryptographic perspective), as well as all other curves whose group order is not divisible by 4. Each type of curve is characterized by the degree and factorization form of the polynomial h(x) in the curve equation. For each of these curves, we provide explicit halving formulae for all possible divisor classes, and not only the most frequent case where the degree of the first polynomial in the Mumford representation is 2. In the optimal performance case, where h(x) = x, we also improve on the state-of-the-art and when h(x) is irreducible of degree 2, we achieve significant savings over both the doubling as well as the previously fastest halving formulas.
international conference on selected areas in cryptography | 2006
Peter Birkner
Efficient halving of divisor classes offers the possibility to improve scalar multiplication on hyperelliptic curves and is also a step towards giving hyperelliptic curve cryptosystems all the features that elliptic curve systems have. We present a halving algorithm for divisor classes of genus 2 curves over finite fields of characteristic 2. We derive explicit halving formulae from a doubling algorithm by reversing this process. A family of binary curves, that are not known to be weak, is covered by the proposed algorithm. Compared to previous known halving algorithms, we achieve a noticeable speed-up for this family of curves.
The Journal of Physical Chemistry | 2008
Peter Birkner
• A submitted manuscript is the version of the article upon submission and before peer-review. There can be important differences between the submitted version and the official published version of record. People interested in the research are advised to contact the author for the final version of the publication, or visit the DOI to the publishers website. • The final author version and the galley proof are versions of the publication after peer review. • The final published version features the final layout of the paper including the volume, issue and page numbers.
international conference on progress in cryptology | 2008
Daniel J. Bernstein; Peter Birkner; Marc Joye; Tanja Lange; Cp Christiane Peters
IACR Cryptology ePrint Archive | 2009
Daniel V. Bailey; Lejla Batina; Daniel J. Bernstein; Peter Birkner; Joppe W. Bos; Hsieh-Chung Chen; Chen-Mou Cheng; Gauthier Van Damme; Giacomo de Meulenaer; Luis Julian Dominguez Perez; Junfeng Fan; Tim Güneysu; Frank K. Gürkaynak; Thorsten Kleinjung; Tanja Lange; Nele Mentens; Ruben Niederhagen; Christof Paar; Francesco Regazzoni; Peter Schwabe; Leif Uhsadel; Anthony Van Herrewege; Bo-Yin Yang
international conference on progress in cryptology | 2010
Daniel J. Bernstein; Peter Birkner; Tanja Lange
IACR Cryptology ePrint Archive | 2009
Daniel V. Bailey; Brian Baldwin; Lejla Batina; Daniel J. Bernstein; Peter Birkner; Joppe W. Bos; G. De Meulenaer; Junfeng Fan; Tim Güneysu; Frank K. Gürkaynak; Thorsten Kleinjung; Tanja Lange; Nele Mentens; Christof Paar; Francesco Regazzoni; Peter Schwabe; Leif Uhsadel; G. Van Damme
IACR Cryptology ePrint Archive | 2011
Peter Birkner; Patrick Longa; Francesco Sica