Elliptic curve cryptography point multiplication core for hardware security module
In today's technology, a sheer number of Internet of Things applications use hardware
security modules for secure communications. The widely used algorithms in security …
security modules for secure communications. The widely used algorithms in security …
Efficient RNS Implementation of Elliptic Curve Point Multiplication Over
M Esmaeildoust, D Schinianakis… - … Transactions on Very …, 2012 - ieeexplore.ieee.org
Elliptic curve point multiplication (ECPM) is one of the most critical operations in elliptic
curve cryptography. In this brief, a new hardware architecture for ECPM over GF (p) is …
curve cryptography. In this brief, a new hardware architecture for ECPM over GF (p) is …
[图书][B] Wireless security and cryptography: specifications and implementations
As the use of wireless devices becomes widespread, so does the need for strong and
secure transport protocols. Even with this intensified need for securing systems, using …
secure transport protocols. Even with this intensified need for securing systems, using …
An efficient authenticated elliptic curve cryptography scheme for multicore wireless sensor networks
ET Oladipupo, OC Abikoye, AL Imoize… - IEEE …, 2023 - ieeexplore.ieee.org
The need to ensure the longevity of Wireless Sensor Networks (WSNs) and secure their
communication has spurred various researchers to come up with various WSN models …
communication has spurred various researchers to come up with various WSN models …
An RNS Implementation of an Elliptic Curve Point Multiplier
DM Schinianakis, AP Fournaris… - … on Circuits and …, 2008 - ieeexplore.ieee.org
Elliptic curve point multiplication is considered to be the most significant operation in all
elliptic curve cryptography systems, as it forms the basis of the elliptic curve discrete …
elliptic curve cryptography systems, as it forms the basis of the elliptic curve discrete …
Efficient cryptographic hardware for safety message verification in internet of connected vehicles
MA Mehrabi, A Jolfaei - ACM Transactions on Internet Technology, 2022 - dl.acm.org
An important security requirement in automotive networks is to authenticate, sign, and verify
thousands of short messages per second by each vehicle. This requirement mandates the …
thousands of short messages per second by each vehicle. This requirement mandates the …
Multi-Functional Resource-Constrained Elliptic Curve Cryptographic Processor
BK Do-Nguyen, C Pham-Quoc, NT Tran… - IEEE …, 2023 - ieeexplore.ieee.org
With the rising data evolution, the demand for secured communications over networks is
rising immensely. Elliptic Curve Cryptography (ECC) provides an attractive solution to fulfill …
rising immensely. Elliptic Curve Cryptography (ECC) provides an attractive solution to fulfill …
High Precision Multiplier for RNS {2n−1,2n,2n+1}
S Ma, S Hu, Z Yang, X Wang, M Liu, J Hu - Electronics, 2021 - mdpi.com
The Residue Number System (RNS) is a non-weighted number system. Benefiting from its
inherent parallelism, RNS has been widely studied and used in Digital Signal Processing …
inherent parallelism, RNS has been widely studied and used in Digital Signal Processing …
Fault and power analysis attack resistant RNS based edwards curve point multiplication
AP Fournaris, N Klaoudatos, N Sklavos… - Proceedings of the …, 2015 - dl.acm.org
In this paper, a road-map toward Fault (FA) and Power Analysis Attack (PA) resistance is
proposed that combines the Edwards Curves innate PA resistance and a base point …
proposed that combines the Edwards Curves innate PA resistance and a base point …
An RNS Barrett modular multiplication architecture
D Schinianakis, T Stouraitis - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
Existing RNS implementations of modular multiplication employ Montgomery's technique,
especially in cryptography where consecutive multiplications of large integers are used for …
especially in cryptography where consecutive multiplications of large integers are used for …