10.01.2015 Views

G - 16th workshop on Elliptic Curve Cryptography

G - 16th workshop on Elliptic Curve Cryptography

G - 16th workshop on Elliptic Curve Cryptography

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Applying ρ-method <strong>on</strong> Step 1 (c<strong>on</strong>t’d)<br />

• For obtaining k1, step1 finds u and v such that ζ du G d = ζ dv G<br />

• Similarly, from an initial point G, points are ζ dj G randomly<br />

generated by using the random-walk functi<strong>on</strong> F(G)<br />

G<br />

22<br />

Copyright 2012 FUJITSU LABORATORIES Ltd.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!