ACryp-Proc: Flexible asymmetric crypto processor for point multiplication
Flexibility is one of the driving agents for 5G architecture development to incorporate
enhanced mobile broad band, machine type communication (MTC), and ultra-reliable MTC …
enhanced mobile broad band, machine type communication (MTC), and ultra-reliable MTC …
Architectural review of polynomial bases finite field multipliers over GF(2m)
In elliptic curve cryptography (ECC), hardware architectures of finite field (FF) multipliers are
frequently proposed for polynomial as well as for normal bases representations over GF (2 …
frequently proposed for polynomial as well as for normal bases representations over GF (2 …
A survey on hardware implementations of elliptic curve cryptosystems
B Rashidi - arXiv preprint arXiv:1710.08336, 2017 - arxiv.org
In the past two decades, Elliptic Curve Cryptography (ECC) have become increasingly
advanced. ECC, with much smaller key sizes, offers equivalent security when compared to …
advanced. ECC, with much smaller key sizes, offers equivalent security when compared to …
Field Programmable Gate Array based elliptic curve Menezes‐Qu‐Vanstone key agreement protocol realization using Physical Unclonable Function and true random …
NN Anandakumar, MS Hashmi… - IET Circuits, Devices & …, 2022 - Wiley Online Library
The trust, authenticity and integrity of Internet‐of‐Things (IoT) systems are heavily reliant on
Physical Unclonable Functions (PUFs) and True random number generators (TRNGs). The …
Physical Unclonable Functions (PUFs) and True random number generators (TRNGs). The …
An optimized architecture for binary huff curves with improved security
In order to compute the elliptic curve point addition and doubling, the unified point addition
law provides better protection against side channel attacks. One of the elliptic curve models …
law provides better protection against side channel attacks. One of the elliptic curve models …
Side-channel analysis on blinded regular scalar multiplications
B Feix, M Roussellet, A Venelli - … Conference on Cryptology in India, New …, 2014 - Springer
We present a new side-channel attack path threatening state-of-the-art protected
implementations of elliptic curves embedded scalar multiplications. Regular algorithms such …
implementations of elliptic curves embedded scalar multiplications. Regular algorithms such …
Towards an optimized architecture for unified binary huff curves
AR Jafri, MN ul Islam, M Imran… - Journal of Circuits …, 2017 - World Scientific
Applying unified formula while computing point addition and doubling provides immunity to
Elliptic Curve Cryptography (ECC) against power analysis attacks (a type of side channel …
Elliptic Curve Cryptography (ECC) against power analysis attacks (a type of side channel …
[HTML][HTML] A Unified Point Multiplication Architecture of Weierstrass, Edward and Huff Elliptic Curves on FPGA
This article presents an area-aware unified hardware accelerator of Weierstrass, Edward,
and Huff curves over GF (2 233) for the point multiplication step in elliptic curve cryptography …
and Huff curves over GF (2 233) for the point multiplication step in elliptic curve cryptography …
A 4-stage pipelined architecture for point multiplication of binary huff curves
This work has proposed a 4-stage pipelined architecture to achieve an optimized throughput
over area ratio for point multiplication (PM) computation in binary huff curves (BHC) …
over area ratio for point multiplication (PM) computation in binary huff curves (BHC) …
Binary edwards curves revisited
KH Kim, CO Lee, C Negre - International Conference on Cryptology in …, 2014 - Springer
We present new formulas for the arithmetic on the binary Edwards curves which are much
faster than the-state-of-the-art. The representative speedup are 3 M+ 2D+ S for a point …
faster than the-state-of-the-art. The representative speedup are 3 M+ 2D+ S for a point …