Elliptic curve cryptography point multiplication core for hardware security module

MA Mehrabi, C Doche, A Jolfaei - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In today's technology, a sheer number of Internet of Things applications use hardware
security modules for secure communications. The widely used algorithms in security …

Efficient RNS Implementation of Elliptic Curve Point Multiplication Over

M Esmaeildoust, D Schinianakis… - … Transactions on Very …, 2012 - ieeexplore.ieee.org
Elliptic curve point multiplication (ECPM) is one of the most critical operations in elliptic
curve cryptography. In this brief, a new hardware architecture for ECPM over GF (p) is …

[图书][B] Wireless security and cryptography: specifications and implementations

N Sklavos, M Manninger, X Zhang, O Koufopavlou… - 2017 - taylorfrancis.com
As the use of wireless devices becomes widespread, so does the need for strong and
secure transport protocols. Even with this intensified need for securing systems, using …

An efficient authenticated elliptic curve cryptography scheme for multicore wireless sensor networks

ET Oladipupo, OC Abikoye, AL Imoize… - IEEE …, 2023 - ieeexplore.ieee.org
The need to ensure the longevity of Wireless Sensor Networks (WSNs) and secure their
communication has spurred various researchers to come up with various WSN models …

An RNS Implementation of an Elliptic Curve Point Multiplier

DM Schinianakis, AP Fournaris… - … on Circuits and …, 2008 - ieeexplore.ieee.org
Elliptic curve point multiplication is considered to be the most significant operation in all
elliptic curve cryptography systems, as it forms the basis of the elliptic curve discrete …

Efficient cryptographic hardware for safety message verification in internet of connected vehicles

MA Mehrabi, A Jolfaei - ACM Transactions on Internet Technology, 2022 - dl.acm.org
An important security requirement in automotive networks is to authenticate, sign, and verify
thousands of short messages per second by each vehicle. This requirement mandates the …

Multi-Functional Resource-Constrained Elliptic Curve Cryptographic Processor

BK Do-Nguyen, C Pham-Quoc, NT Tran… - IEEE …, 2023 - ieeexplore.ieee.org
With the rising data evolution, the demand for secured communications over networks is
rising immensely. Elliptic Curve Cryptography (ECC) provides an attractive solution to fulfill …

High Precision Multiplier for RNS {2n−1,2n,2n+1}

S Ma, S Hu, Z Yang, X Wang, M Liu, J Hu - Electronics, 2021 - mdpi.com
The Residue Number System (RNS) is a non-weighted number system. Benefiting from its
inherent parallelism, RNS has been widely studied and used in Digital Signal Processing …

Fault and power analysis attack resistant RNS based edwards curve point multiplication

AP Fournaris, N Klaoudatos, N Sklavos… - Proceedings of the …, 2015 - dl.acm.org
In this paper, a road-map toward Fault (FA) and Power Analysis Attack (PA) resistance is
proposed that combines the Edwards Curves innate PA resistance and a base point …

An RNS Barrett modular multiplication architecture

D Schinianakis, T Stouraitis - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
Existing RNS implementations of modular multiplication employ Montgomery's technique,
especially in cryptography where consecutive multiplications of large integers are used for …