A survey of public-key cryptographic primitives in wireless sensor networks

KA Shim - IEEE Communications Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Cryptographic primitives are fundamental building blocks for designing security protocols to
achieve confidentiality, authentication, integrity and non-repudiation. It is not too much to say …

“Ooh Aah... Just a Little Bit”: a small amount of side channel can go a long way

N Benger, J Van de Pol, NP Smart, Y Yarom - … Hardware and Embedded …, 2014 - Springer
Abstract We apply the Flush+ Reload side-channel attack based on cache hits/misses to
extract a small amount of data from OpenSSL ECDSA signature requests. We then apply a …

Four: four-dimensional decompositions on a-curve over the mersenne prime

C Costello, P Longa - International Conference on the Theory and …, 2015 - Springer
We introduce Four Q, a high-security, high-performance elliptic curve that targets the 128-bit
security level. At the highest arithmetic level, cryptographic scalar multiplications on Four Q …

Selecting elliptic curves for cryptography: an efficiency and security analysis

JW Bos, C Costello, P Longa, M Naehrig - Journal of Cryptographic …, 2016 - Springer
We select a set of elliptic curves for cryptography and analyze our selection from a
performance and security perspective. This analysis complements recent curve proposals …

Elliptic curve cryptography with efficiently computable endomorphisms and its hardware implementations for the internet of things

Z Liu, J Großschädl, Z Hu, K Järvinen… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
Verification of an ECDSA signature requires a double scalar multiplication on an elliptic
curve. In this work, we study the computation of this operation on a twisted Edwards curve …

Four on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks

Z Liu, P Longa, GCCF Pereira… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
This work deals with the energy-efficient, high-speed and high-security implementation of
elliptic curve scalar multiplication, elliptic curve Diffie-Hellman (ECDH) key exchange and …

High-performance implementation of elliptic curve cryptography using vector instructions

A Faz-Hernández, J López, R Dahab - ACM Transactions on …, 2019 - dl.acm.org
Elliptic curve cryptosystems are considered an efficient alternative to conventional systems
such as DSA and RSA. Recently, Montgomery and Edwards elliptic curves have been used …

Twisted hessian curves

DJ Bernstein, C Chuengsatiansup, D Kohel… - … on Cryptology and …, 2015 - Springer
This paper presents new speed records for arithmetic on a large family of elliptic curves with
cofactor 3: specifically, 8.77 M 8.77 M per bit for 256-bit variable-base single-scalar …

SIDH on ARM: faster modular multiplications for faster post-quantum supersingular isogeny key exchange

H Seo, Z Liu, P Longa, Z Hu - IACR Transactions on Cryptographic …, 2018 - tches.iacr.org
We present high-speed implementations of the post-quantum supersingular isogeny Diffie-
Hellman key exchange (SIDH) and the supersingular isogeny key encapsulation (SIKE) …

Kummer strikes back: new DH speed records

DJ Bernstein, C Chuengsatiansup, T Lange… - Advances in Cryptology …, 2014 - Springer
This paper sets new speed records for high-security constant-time variable-base-point Diffie–
Hellman software: 305395 Cortex-A8-slow cycles; 273349 Cortex-A8-fast cycles; 88916 …