In this paper we analyse realization of a coprocessor which supports counting of discrete logarithm on elliptic curves over the field FG(p), where p is the large prime, in FPGA. Main idea of the realization is based on using modules which are able to add the points and have relatively small resources’ requirements. We showed the simplified case in which we know l most significant bits of key k and we used one-dimensional Gaudry–Schost method. We also generalize that case and analyse the case when unknown bits are given in many disjoint intervals. To do this we propose using a multidimensional Gaudry–Schost method. At the end of this article we show the solution which provides best trade-off between throughput and price of a device. Keyword...
We describe a cell processor implementation of Pollard’s rho method to solve discrete logarithms in ...
FPGAs are an attractive platform for elliptic curve cryptography hardware. Since field multiplicatio...
Theoretical thesis.Bibliography: pages 207-215.1. Introduction -- 2. Background -- 3. RNS arithmetic...
This paper accelerates FPGA computations of discrete logarithms on elliptic curves over binary field...
Abstract. Using FPGAs to compute the discrete logarithms of elliptic curves is a well-known method. ...
This paper proposes an FPGA-based application-specific elliptic curve processor over a prime field. ...
Elliptic curves have become widespread in cryptographic applications since they offer the same crypt...
International audienceThe discrete logarithm problem based on elliptic and hyperelliptic curves has ...
The main focus of this thesis is the so-called elliptic curve discrete logarithm problem. The statem...
Abstract. We present a new hardware architecture to compute scalar multiplications in the group of r...
This paper examines the cryptographic security of fixed versus random elliptic curves over GF(p). It...
Abstract. Cryptographic protocols often make use of the inherent hardness of the classical discrete ...
This work presents a new concept to implement the elliptic curve point multiplication (PM). This com...
This paper presents an elliptic curve cryptography processor for prime fields implemented on a FPGA-...
This paper begins by describing basic properties of finite field and elliptic curve cryptography ove...
We describe a cell processor implementation of Pollard’s rho method to solve discrete logarithms in ...
FPGAs are an attractive platform for elliptic curve cryptography hardware. Since field multiplicatio...
Theoretical thesis.Bibliography: pages 207-215.1. Introduction -- 2. Background -- 3. RNS arithmetic...
This paper accelerates FPGA computations of discrete logarithms on elliptic curves over binary field...
Abstract. Using FPGAs to compute the discrete logarithms of elliptic curves is a well-known method. ...
This paper proposes an FPGA-based application-specific elliptic curve processor over a prime field. ...
Elliptic curves have become widespread in cryptographic applications since they offer the same crypt...
International audienceThe discrete logarithm problem based on elliptic and hyperelliptic curves has ...
The main focus of this thesis is the so-called elliptic curve discrete logarithm problem. The statem...
Abstract. We present a new hardware architecture to compute scalar multiplications in the group of r...
This paper examines the cryptographic security of fixed versus random elliptic curves over GF(p). It...
Abstract. Cryptographic protocols often make use of the inherent hardness of the classical discrete ...
This work presents a new concept to implement the elliptic curve point multiplication (PM). This com...
This paper presents an elliptic curve cryptography processor for prime fields implemented on a FPGA-...
This paper begins by describing basic properties of finite field and elliptic curve cryptography ove...
We describe a cell processor implementation of Pollard’s rho method to solve discrete logarithms in ...
FPGAs are an attractive platform for elliptic curve cryptography hardware. Since field multiplicatio...
Theoretical thesis.Bibliography: pages 207-215.1. Introduction -- 2. Background -- 3. RNS arithmetic...