A fast window-based scalar multiplication algorithm for elliptic curve cryptography in wireless sensor networks

Hung Nan Ye, Kuo-Chen Wang, Rong Hong Jan, Yuh-Jyh Hu, Yu-Chee Tseng, Yi Huai Hsu

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review


In this paper, we propose an enhanced window-based mutual opposite form (EW-MOF) for scalar multiplication with ECC in WSNs. The proposed EW-MOF combines MOF with an enhanced window method that can reduce not only pre-computation time and memory usage, but also average key generation time that includes pre-computation time in each sensor node. Our analysis has shown that the proposed EW-MOF requires a smaller number of essential pre-computed points than the one's complement. Therefore, it is very suitable for WSNs. Simulation results show that the proposed EW-MOF is 24.69% faster than the one's complement method, which is the best method available, in the average key generation time of ECC that includes pre-computation time under different field sizes. In summary, the proposed EW-MOF is more feasible than the one's complement for wireless sensor networks in terms of key generation time and power saving.

Original languageEnglish
Title of host publicationIntelligent Systems and Applications - Proceedings of the International Computer Symposium, ICS 2014
EditorsWilliam Cheng-Chung Chu, Stephen Jenn-Hwa Yang, Han-Chieh Chao
PublisherIOS Press
Number of pages10
ISBN (Electronic)9781614994831
StatePublished - 1 Jan 2015
EventInternational Computer Symposium, ICS 2014 - Taichung, Taiwan
Duration: 12 Dec 201414 Dec 2014

Publication series

NameFrontiers in Artificial Intelligence and Applications
ISSN (Print)0922-6389


ConferenceInternational Computer Symposium, ICS 2014


  • Elliptic curve cryptography
  • mutual opposite form
  • one's complement
  • scalar multiplication
  • window method

Fingerprint Dive into the research topics of 'A fast window-based scalar multiplication algorithm for elliptic curve cryptography in wireless sensor networks'. Together they form a unique fingerprint.

Cite this