ACryp-Proc: Flexible asymmetric crypto processor for point multiplication

M Imran, M Rashid, AR Jafri, M Najam-ul-Islam - IEEE Access, 2018 - ieeexplore.ieee.org
Flexibility is one of the driving agents for 5G architecture development to incorporate
enhanced mobile broad band, machine type communication (MTC), and ultra-reliable MTC …

Architectural review of polynomial bases finite field multipliers over GF(2m)

M Imran, M Rashid - … Computing and Digital Systems (C-CODE …, 2017 - ieeexplore.ieee.org
In elliptic curve cryptography (ECC), hardware architectures of finite field (FF) multipliers are
frequently proposed for polynomial as well as for normal bases representations over GF (2 …

A survey on hardware implementations of elliptic curve cryptosystems

B Rashidi - arXiv preprint arXiv:1710.08336, 2017 - arxiv.org
In the past two decades, Elliptic Curve Cryptography (ECC) have become increasingly
advanced. ECC, with much smaller key sizes, offers equivalent security when compared to …

Field Programmable Gate Array based elliptic curve Menezes‐Qu‐Vanstone key agreement protocol realization using Physical Unclonable Function and true random …

NN Anandakumar, MS Hashmi… - IET Circuits, Devices & …, 2022 - Wiley Online Library
The trust, authenticity and integrity of Internet‐of‐Things (IoT) systems are heavily reliant on
Physical Unclonable Functions (PUFs) and True random number generators (TRNGs). The …

An optimized architecture for binary huff curves with improved security

M Rashid, M Imran, M Kashif, A Sajid - IEEE Access, 2021 - ieeexplore.ieee.org
In order to compute the elliptic curve point addition and doubling, the unified point addition
law provides better protection against side channel attacks. One of the elliptic curve models …

Side-channel analysis on blinded regular scalar multiplications

B Feix, M Roussellet, A Venelli - … Conference on Cryptology in India, New …, 2014 - Springer
We present a new side-channel attack path threatening state-of-the-art protected
implementations of elliptic curves embedded scalar multiplications. Regular algorithms such …

Towards an optimized architecture for unified binary huff curves

AR Jafri, MN ul Islam, M Imran… - Journal of Circuits …, 2017 - World Scientific
Applying unified formula while computing point addition and doubling provides immunity to
Elliptic Curve Cryptography (ECC) against power analysis attacks (a type of side channel …

[HTML][HTML] A Unified Point Multiplication Architecture of Weierstrass, Edward and Huff Elliptic Curves on FPGA

M Arif, OS Sonbul, M Rashid, M Murad, MH Sinky - Applied Sciences, 2023 - mdpi.com
This article presents an area-aware unified hardware accelerator of Weierstrass, Edward,
and Huff curves over GF (2 233) for the point multiplication step in elliptic curve cryptography …

A 4-stage pipelined architecture for point multiplication of binary huff curves

M Rashid, M Imran, AR Jafri… - Journal of Circuits …, 2020 - World Scientific
This work has proposed a 4-stage pipelined architecture to achieve an optimized throughput
over area ratio for point multiplication (PM) computation in binary huff curves (BHC) …

Binary edwards curves revisited

KH Kim, CO Lee, C Negre - International Conference on Cryptology in …, 2014 - Springer
We present new formulas for the arithmetic on the binary Edwards curves which are much
faster than the-state-of-the-art. The representative speedup are 3 M+ 2D+ S for a point …