FPGA implementation for elliptic curve cryptography algorithm and circuit with high efficiency and low delay for IoT applications
D Wang, Y Lin, J Hu, C Zhang, Q Zhong - Micromachines, 2023 - mdpi.com
The Internet of Things requires greater attention to the security and privacy of the network.
Compared to other public-key cryptosystems, elliptic curve cryptography can provide better …
Compared to other public-key cryptosystems, elliptic curve cryptography can provide better …
Stealing keys from hardware wallets: A single trace side-channel attack on elliptic curve scalar multiplication without profiling
Over the past decade, decentralized cryptocurrencies have received attention in industry
and academia. Hardware wallets are dedicated devices that manage cryptocurrencies …
and academia. Hardware wallets are dedicated devices that manage cryptocurrencies …
Topgun: An ECC Accelerator for Private Set Intersection
G Wu, Q He, J Jiang, Z Zhang, Y Zhao, Y Zou… - ACM Transactions on …, 2023 - dl.acm.org
Elliptic Curve Cryptography (ECC), one of the most widely used asymmetric cryptographic
algorithms, has been deployed in Transport Layer Security (TLS) protocol, blockchain …
algorithms, has been deployed in Transport Layer Security (TLS) protocol, blockchain …
[PDF][PDF] Pragmatic analysis of ECC based security models from an empirical perspective
This paper provides a detailed discussion about currently proposed Elliptic Curve
Cryptography (ECC) models focusing on performance parameters such as Security …
Cryptography (ECC) models focusing on performance parameters such as Security …
A dual-core high-performance processor for elliptic curve cryptography in GF (p) over generic weierstrass curves
A dual-core high-performance processor for Elliptic Curve Cryptography (ECC) in GF () over
Generic Weierstrass Curves was presented in this brief. Firstly, an optimized radix-128 …
Generic Weierstrass Curves was presented in this brief. Firstly, an optimized radix-128 …
A Digital Signature Architecture Suitable for V2V Applications
H Mosanaei-Boorani… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The elliptic curve digital signature algorithm (ECDSA) is widely used for guaranteeing data
integrity and user authentication in internet of things (IoT) applications such as intelligent …
integrity and user authentication in internet of things (IoT) applications such as intelligent …
Lightweight ECC coprocessor with resistance against power analysis attacks over NIST prime fields
P Choi - IEEE Transactions on Circuits and Systems II: Express …, 2022 - ieeexplore.ieee.org
This brief proposes a compact and fast elliptic curve cryptography coprocessor using affine
coordinates. Although using affine coordinates requires compute-intensive modular …
coordinates. Although using affine coordinates requires compute-intensive modular …
A speed‐area‐efficient hardware ECPM‐engine in GF(p) over generic Weierstrass curves
This paper proposes a 256‐bit speed‐area‐efficient hardware elliptic curve point‐
multiplication engine (ECPM‐engine) in GF (p) over generic Weierstrass curves, which is …
multiplication engine (ECPM‐engine) in GF (p) over generic Weierstrass curves, which is …
LLP-ECCA: A Low-Latency and Programmable Framework for Elliptic Curve Cryptography Accelerators
Y Huang, X Wang, T Dai, J Yang, Z Lu… - … Test Conference in …, 2024 - ieeexplore.ieee.org
Elliptic curve cryptography (ECC) plays a pivotal role in safeguarding data integrity and
authentication in contemporary communication contexts, particularly within the domain of …
authentication in contemporary communication contexts, particularly within the domain of …
[PDF][PDF] 基于动态补偿的椭圆曲线密码低成本抗功耗攻击策略及硬件结构研究
李伟, 曾涵, 陈韬, 南龙梅 - 电子与信息学报, 2021 - jeit.ac.cn
椭圆曲线密码(ECC) 芯片的抗功耗攻击能力往往以电路性能, 面积或功耗为代价.
该文分析了在椭圆曲线密码点乘运算中密钥猜测正确与错误时的中间数据汉明距离概率分布 …
该文分析了在椭圆曲线密码点乘运算中密钥猜测正确与错误时的中间数据汉明距离概率分布 …