Physical attack protection techniques for IC chip level hardware security

M Nagata, T Miki, N Miura - IEEE transactions on very large …, 2021 - ieeexplore.ieee.org
Secure hardware systems are threatened by adversarial attempts on integrated circuit (IC)
chips in a practical utilization environment. This article provides overviews of physical …

Energy/area-efficient scalar multiplication with binary Edwards curves for the IoT

CA Lara-Nino, A Diaz-Perez, M Morales-Sandoval - Sensors, 2019 - mdpi.com
Making Elliptic Curve Cryptography (ECC) available for the Internet of Things (IoT) and
related technologies is a recent topic of interest. Modern IoT applications transfer sensitive …

Efficient and secure algorithm: the application and improvement of ECDSA

Y Shang - 2022 International Conference on Big Data …, 2022 - ieeexplore.ieee.org
As a currently widely used digital signature algorithm, ECDSA is more efficient than RSA.
Specifically, ECDSA provides a shorter key than RSA in the same security level. This makes …

Commpact: Evaluating the feasibility of autonomous vehicle contracts

J Erickson, S Chen, M Savich, S Hu… - 2018 IEEE Vehicular …, 2018 - ieeexplore.ieee.org
In Autonomous Vehicle (AV) platooning, vehicles queue up with minimal following distances
for improved traffic density and fuel economy. If one vehicle is compromised and suddenly …

Low Latency 256-bit ECDSA Signature Generation Crypto Processor

S Sugiyama, H Awano, M Ikeda - IEICE Transactions on …, 2018 - search.ieice.org
A 256-bit $ mathbb {F} _p $ ECDSA crypto processor featuring low latency, low energy
consumption and capability of changing the Elliptic curve parameters is designed and …

On-chip physical attack protection circuits for hardware security

M Nagata, T Miki, N Miura - 2019 IEEE Custom Integrated …, 2019 - ieeexplore.ieee.org
Hardware security, application of modern digital cryptography and authentication
technologies for protecting information in electronics, involves analog functionality to avoid …

31.3 μs/Signature-Generation 256-bit 𝔽p ECDSA Cryptoprocessor

S Sugiyama, H Awano, M Ikeda - 2018 IEEE Asian Solid-State …, 2018 - ieeexplore.ieee.org
A 256-bit F p elliptic curve digital signature algorithm (ECDSA) cryptoprocessor featuring low
latency, low energy consumption, and the ability to change the elliptic curve parameters is …

Evaluation of Libraries and Typical Embedded Systems for ECDSA Signature Verification for Car2X Communication

M Kramer, F Gerstmayer… - 2018 IEEE 23rd …, 2018 - ieeexplore.ieee.org
Over the last decades, cars have become more and more prevalent and play an important
role in our modern society. With the continuously growing number of vehicles, also the …

On-Chip Protection of Cryptographic ICs Against Physical Side Channel Attacks

M Nagata - 2019 IEEE 13th International Conference on ASIC …, 2019 - ieeexplore.ieee.org
Side channel attacks on semiconductor ICs have become a serious concern. This paper
introduces design techniques of IC chips to realize on-chip detection and even disablement …

Fourℚ on ASIC: Breaking Speed Records for Elliptic Curve Scalar Multiplication

H Awano, M Ikeda - 2019 Design, Automation & Test in Europe …, 2019 - ieeexplore.ieee.org
An ASIC cryptoprocessor for scalar multiplication (SM) on FourQ is proposed. By exploiting
Karatsuba multiplication and lazy reduction techniques, the arithmetic units of the proposed …