Flexible architectures for cryptographic algorithms—A systematic literature review

M Rashid, M Imran, AR Jafri… - Journal of Circuits …, 2019 - World Scientific
Symmetric and asymmetric cryptographic algorithms are used for a secure transmission of
data over an unsecured public channel. In order to use these algorithms in real-time …

Comparative analysis of flexible cryptographic implementations

M Rashid, M Imran, AR Jafri - 2016 11th International …, 2016 - ieeexplore.ieee.org
Flexible hardware implementations of cryptographic algorithms in the real time applications
have been frequently proposed. This paper classifies the state-of-the-art research practices …

[PDF][PDF] A Flexible Architecture for Cryptographic Applications: ECC and PRESENT

M Rashid, OS Sonbul, M Arif, FA Qureshi… - Comput. Mater …, 2023 - researchgate.net
This work presents a flexible/unified hardware architecture of Elliptic-curve Cryptography
(ECC) and PRESENT for cryptographic applications. The features of the proposed work are …

A survey of hardware implementations of elliptic curve cryptographic systems

B Halak, SS Waizi, A Islam - Cryptology ePrint Archive, 2016 - eprint.iacr.org
Abstract Elliptic Curve Cryptography (ECC) has gained much recognition over the last
decades and has established itself among the well known public-key cryptography …

[PDF][PDF] Advanced encryption techniques based on S-box and elliptical curve revisited

P Karki, SR Das, SN Biswas, MH Assaf… - SDPS-2015, Society …, 2015 - researchgate.net
The S-Box (or substitution-box) is the key element in the advanced encryption standard
currently recognized as one of the most popular secret key algorithms in cryptography. The …

Architecture d'un crypto processeur ECC sécurisé contre les attaques physiques

S Pontie - Journées Nationales du Réseau Doctoral en …, 2014 - hal.science
Résumé Les systèmes embarqués doivent supporter de plus de fonctions. C'est le cas du
chiffrement et de l'authentification. Les contraintes apportées par les systèmes embarqués …