A survey of public-key cryptographic primitives in wireless sensor networks
KA Shim - IEEE Communications Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Cryptographic primitives are fundamental building blocks for designing security protocols to
achieve confidentiality, authentication, integrity and non-repudiation. It is not too much to say …
achieve confidentiality, authentication, integrity and non-repudiation. It is not too much to say …
“Ooh Aah... Just a Little Bit”: a small amount of side channel can go a long way
Abstract We apply the Flush+ Reload side-channel attack based on cache hits/misses to
extract a small amount of data from OpenSSL ECDSA signature requests. We then apply a …
extract a small amount of data from OpenSSL ECDSA signature requests. We then apply a …
Four: four-dimensional decompositions on a-curve over the mersenne prime
C Costello, P Longa - International Conference on the Theory and …, 2015 - Springer
We introduce Four Q, a high-security, high-performance elliptic curve that targets the 128-bit
security level. At the highest arithmetic level, cryptographic scalar multiplications on Four Q …
security level. At the highest arithmetic level, cryptographic scalar multiplications on Four Q …
Selecting elliptic curves for cryptography: an efficiency and security analysis
We select a set of elliptic curves for cryptography and analyze our selection from a
performance and security perspective. This analysis complements recent curve proposals …
performance and security perspective. This analysis complements recent curve proposals …
Elliptic curve cryptography with efficiently computable endomorphisms and its hardware implementations for the internet of things
Verification of an ECDSA signature requires a double scalar multiplication on an elliptic
curve. In this work, we study the computation of this operation on a twisted Edwards curve …
curve. In this work, we study the computation of this operation on a twisted Edwards curve …
Four on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks
This work deals with the energy-efficient, high-speed and high-security implementation of
elliptic curve scalar multiplication, elliptic curve Diffie-Hellman (ECDH) key exchange and …
elliptic curve scalar multiplication, elliptic curve Diffie-Hellman (ECDH) key exchange and …
High-performance implementation of elliptic curve cryptography using vector instructions
Elliptic curve cryptosystems are considered an efficient alternative to conventional systems
such as DSA and RSA. Recently, Montgomery and Edwards elliptic curves have been used …
such as DSA and RSA. Recently, Montgomery and Edwards elliptic curves have been used …
Twisted hessian curves
This paper presents new speed records for arithmetic on a large family of elliptic curves with
cofactor 3: specifically, 8.77 M 8.77 M per bit for 256-bit variable-base single-scalar …
cofactor 3: specifically, 8.77 M 8.77 M per bit for 256-bit variable-base single-scalar …
SIDH on ARM: faster modular multiplications for faster post-quantum supersingular isogeny key exchange
We present high-speed implementations of the post-quantum supersingular isogeny Diffie-
Hellman key exchange (SIDH) and the supersingular isogeny key encapsulation (SIKE) …
Hellman key exchange (SIDH) and the supersingular isogeny key encapsulation (SIKE) …
Kummer strikes back: new DH speed records
This paper sets new speed records for high-security constant-time variable-base-point Diffie–
Hellman software: 305395 Cortex-A8-slow cycles; 273349 Cortex-A8-fast cycles; 88916 …
Hellman software: 305395 Cortex-A8-slow cycles; 273349 Cortex-A8-fast cycles; 88916 …