Physical attack protection techniques for IC chip level hardware security
Secure hardware systems are threatened by adversarial attempts on integrated circuit (IC)
chips in a practical utilization environment. This article provides overviews of physical …
chips in a practical utilization environment. This article provides overviews of physical …
Energy/area-efficient scalar multiplication with binary Edwards curves for the IoT
CA Lara-Nino, A Diaz-Perez, M Morales-Sandoval - Sensors, 2019 - mdpi.com
Making Elliptic Curve Cryptography (ECC) available for the Internet of Things (IoT) and
related technologies is a recent topic of interest. Modern IoT applications transfer sensitive …
related technologies is a recent topic of interest. Modern IoT applications transfer sensitive …
Efficient and secure algorithm: the application and improvement of ECDSA
Y Shang - 2022 International Conference on Big Data …, 2022 - ieeexplore.ieee.org
As a currently widely used digital signature algorithm, ECDSA is more efficient than RSA.
Specifically, ECDSA provides a shorter key than RSA in the same security level. This makes …
Specifically, ECDSA provides a shorter key than RSA in the same security level. This makes …
Commpact: Evaluating the feasibility of autonomous vehicle contracts
In Autonomous Vehicle (AV) platooning, vehicles queue up with minimal following distances
for improved traffic density and fuel economy. If one vehicle is compromised and suddenly …
for improved traffic density and fuel economy. If one vehicle is compromised and suddenly …
Low Latency 256-bit ECDSA Signature Generation Crypto Processor
A 256-bit $ mathbb {F} _p $ ECDSA crypto processor featuring low latency, low energy
consumption and capability of changing the Elliptic curve parameters is designed and …
consumption and capability of changing the Elliptic curve parameters is designed and …
On-chip physical attack protection circuits for hardware security
Hardware security, application of modern digital cryptography and authentication
technologies for protecting information in electronics, involves analog functionality to avoid …
technologies for protecting information in electronics, involves analog functionality to avoid …
31.3 μs/Signature-Generation 256-bit 𝔽p ECDSA Cryptoprocessor
A 256-bit F p elliptic curve digital signature algorithm (ECDSA) cryptoprocessor featuring low
latency, low energy consumption, and the ability to change the elliptic curve parameters is …
latency, low energy consumption, and the ability to change the elliptic curve parameters is …
Evaluation of Libraries and Typical Embedded Systems for ECDSA Signature Verification for Car2X Communication
M Kramer, F Gerstmayer… - 2018 IEEE 23rd …, 2018 - ieeexplore.ieee.org
Over the last decades, cars have become more and more prevalent and play an important
role in our modern society. With the continuously growing number of vehicles, also the …
role in our modern society. With the continuously growing number of vehicles, also the …
On-Chip Protection of Cryptographic ICs Against Physical Side Channel Attacks
M Nagata - 2019 IEEE 13th International Conference on ASIC …, 2019 - ieeexplore.ieee.org
Side channel attacks on semiconductor ICs have become a serious concern. This paper
introduces design techniques of IC chips to realize on-chip detection and even disablement …
introduces design techniques of IC chips to realize on-chip detection and even disablement …
Fourℚ on ASIC: Breaking Speed Records for Elliptic Curve Scalar Multiplication
An ASIC cryptoprocessor for scalar multiplication (SM) on FourQ is proposed. By exploiting
Karatsuba multiplication and lazy reduction techniques, the arithmetic units of the proposed …
Karatsuba multiplication and lazy reduction techniques, the arithmetic units of the proposed …