A low-latency and low-complexity point-multiplication in ECC
R Salarifard, S Bayat-Sarmadi… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Elliptic curve cryptography (ECC) has received attention, because it can achieve the same
security level as other asymmetric methods while using a key with smaller length. Although …
security level as other asymmetric methods while using a key with smaller length. Although …
Architectural review of polynomial bases finite field multipliers over GF(2m)
In elliptic curve cryptography (ECC), hardware architectures of finite field (FF) multipliers are
frequently proposed for polynomial as well as for normal bases representations over GF (2 …
frequently proposed for polynomial as well as for normal bases representations over GF (2 …
High-speed hardware architecture of scalar multiplication for binary elliptic curve cryptosystems
In this paper a hardware architecture of scalar multiplication based on Montgomery ladder
algorithm for binary elliptic curve cryptography is presented. In the proposed architecture …
algorithm for binary elliptic curve cryptography is presented. In the proposed architecture …
High-speed hardware implementations of point multiplication for binary Edwards and generalized Hessian curves
B Rashidi, RR Farashahi, SM Sayedi - Cryptology ePrint Archive, 2017 - eprint.iacr.org
In this paper high-speed hardware architectures of point multiplication based on
Montgomery ladder algorithm for binary Edwards and generalized Hessian curves in …
Montgomery ladder algorithm for binary Edwards and generalized Hessian curves in …
[PDF][PDF] Hardware implementation of efficient elliptic curve scalar multiplication using vedic multiplier
FPGA implementation of scalar multiplication using a Vedic multiplier. Scalar multiplication
is the most important operation in Elliptic Curve Cryptography (ECC), which used for public …
is the most important operation in Elliptic Curve Cryptography (ECC), which used for public …
Implementation of Boneh-Lynn-Shacham short digital signature scheme using Weil bilinear pairing based on supersingular elliptic curves
One option for a digital signature solution for devices with low memory and low bandwidth
transmission over channels uses a short digital signature scheme based on Weil bilinear …
transmission over channels uses a short digital signature scheme based on Weil bilinear …
[PDF][PDF] A novel efficient hardware implementation of elliptic curve cryptography scalar multiplication using vedic multiplier
A Novel Efficient Hardware Implementation of Elliptic Curve Cryptography Scalar Multiplication
using Vedic Multiplier Page 1 RAKESH K. KADU et al: A NOVEL EFFICIENT HARDWARE …
using Vedic Multiplier Page 1 RAKESH K. KADU et al: A NOVEL EFFICIENT HARDWARE …
Systolic design space exploration of EEA-based inversion over binary and ternary fields
I Hazmi - 2018 - dspace.library.uvic.ca
Cryptographic protocols are implemented in hardware to ensure low-area, high speed and
reduced power consumption especially for mobile devices. Elliptic Curve Cryptography …
reduced power consumption especially for mobile devices. Elliptic Curve Cryptography …
Hardware Implementation of Elliptic Curve Cryptosystem Using Optimized Scalar Multiplication
This paper presents a hardware implementation of Elliptic Curve Cryptography (ECC) with
optimized scalar multiplication. In elliptic curve cryptography, scalar multiplication is an …
optimized scalar multiplication. In elliptic curve cryptography, scalar multiplication is an …
Elliptic curve cryptography in hardware for secure systems: a multi-use reconfigurable soft IP
BF Ferreira - 2014 - meriva.pucrs.br
Nos últimos anos, a indústria tem desenvolvido e colocado no mercado uma grande
quantidade de dispositivos que são capazes de acessar a Internet e outras redes. Isso está …
quantidade de dispositivos que são capazes de acessar a Internet e outras redes. Isso está …