Flexible architectures for cryptographic algorithms—A systematic literature review
Symmetric and asymmetric cryptographic algorithms are used for a secure transmission of
data over an unsecured public channel. In order to use these algorithms in real-time …
data over an unsecured public channel. In order to use these algorithms in real-time …
Comparative analysis of flexible cryptographic implementations
Flexible hardware implementations of cryptographic algorithms in the real time applications
have been frequently proposed. This paper classifies the state-of-the-art research practices …
have been frequently proposed. This paper classifies the state-of-the-art research practices …
[PDF][PDF] A Flexible Architecture for Cryptographic Applications: ECC and PRESENT
This work presents a flexible/unified hardware architecture of Elliptic-curve Cryptography
(ECC) and PRESENT for cryptographic applications. The features of the proposed work are …
(ECC) and PRESENT for cryptographic applications. The features of the proposed work are …
A survey of hardware implementations of elliptic curve cryptographic systems
B Halak, SS Waizi, A Islam - Cryptology ePrint Archive, 2016 - eprint.iacr.org
Abstract Elliptic Curve Cryptography (ECC) has gained much recognition over the last
decades and has established itself among the well known public-key cryptography …
decades and has established itself among the well known public-key cryptography …
[PDF][PDF] Advanced encryption techniques based on S-box and elliptical curve revisited
The S-Box (or substitution-box) is the key element in the advanced encryption standard
currently recognized as one of the most popular secret key algorithms in cryptography. The …
currently recognized as one of the most popular secret key algorithms in cryptography. The …
Architecture d'un crypto processeur ECC sécurisé contre les attaques physiques
S Pontie - Journées Nationales du Réseau Doctoral en …, 2014 - hal.science
Résumé Les systèmes embarqués doivent supporter de plus de fonctions. C'est le cas du
chiffrement et de l'authentification. Les contraintes apportées par les systèmes embarqués …
chiffrement et de l'authentification. Les contraintes apportées par les systèmes embarqués …