This paper is devoted to the design of a 258-bit multiplier for computing pairings over Barreto-Naehrig (BN) curves at 128-bit security level. The proposed design is optimized for Xilinx field programmable gate array (FPGA). Each 258-bit integer is represented as a polynomial with five, 65 bit signed integer, coefficients. Exploiting this splitting we designed a pipelined 65-bit multiplier based on new Karatsuba- Ofman variant using non-standard splitting to fit to the Xilinx embedded digital signal processor (DSP) blocks. We prototype the coprocessor in two architectures pipelined and serial on a Xilinx Virtex-6 FPGA using around 17000 slices and 11 DSPs in the pipelined design and 7 DSPs in the serial. The pipelined 128-bit pairing is com...
While FPGA is a suitable platform for implementing cryptographic algorithms, there are several chall...
Multiplication of polynomials of large degrees is the predominant operation in lattice-based cryptos...
Abstract. Since the introduction of pairings over (hyper)elliptic curves in constructive cryptograph...
This paper is devoted to the design of a 258- bit multiplier for computing pairings over Barreto-Nae...
This paper proposes design and implementation of a 16-bit multiplier based upon Vedic mathematic<br ...
ASELSAN A.S.;Turkish Aerospace Industries, Inc. (TAI);The Scientific and Technological Research Coun...
In this paper we present a scalar multiplication hardware architecture that computes a constant-time...
Abstract - Cryptographic pairings are important primitives for many advanced cryptosystems. Efficien...
In this paper, we present a high-speed pairing coprocessor using Residue Number System (RNS) which i...
New Number Field Sieves (NFS) attacks on the discrete logarithm problem have led to increase the key...
Here, we present a modified version of the Karatsuba algorithm to facilitate the FPGA-based implemen...
In this paper we present two classes of scalar multiplication hardware architectures that compute a ...
To have an efficient asymmetric key encryption scheme, such as el-liptic curves, hyperelliptic curve...
To have an efficient asymmetric key encryption scheme such as elliptic curves, hyperelliptic curves,...
This article presents an efficient crypto processor architecture for point multiplication accelerati...
While FPGA is a suitable platform for implementing cryptographic algorithms, there are several chall...
Multiplication of polynomials of large degrees is the predominant operation in lattice-based cryptos...
Abstract. Since the introduction of pairings over (hyper)elliptic curves in constructive cryptograph...
This paper is devoted to the design of a 258- bit multiplier for computing pairings over Barreto-Nae...
This paper proposes design and implementation of a 16-bit multiplier based upon Vedic mathematic<br ...
ASELSAN A.S.;Turkish Aerospace Industries, Inc. (TAI);The Scientific and Technological Research Coun...
In this paper we present a scalar multiplication hardware architecture that computes a constant-time...
Abstract - Cryptographic pairings are important primitives for many advanced cryptosystems. Efficien...
In this paper, we present a high-speed pairing coprocessor using Residue Number System (RNS) which i...
New Number Field Sieves (NFS) attacks on the discrete logarithm problem have led to increase the key...
Here, we present a modified version of the Karatsuba algorithm to facilitate the FPGA-based implemen...
In this paper we present two classes of scalar multiplication hardware architectures that compute a ...
To have an efficient asymmetric key encryption scheme, such as el-liptic curves, hyperelliptic curve...
To have an efficient asymmetric key encryption scheme such as elliptic curves, hyperelliptic curves,...
This article presents an efficient crypto processor architecture for point multiplication accelerati...
While FPGA is a suitable platform for implementing cryptographic algorithms, there are several chall...
Multiplication of polynomials of large degrees is the predominant operation in lattice-based cryptos...
Abstract. Since the introduction of pairings over (hyper)elliptic curves in constructive cryptograph...