Hyperelliptic curve cryptosystem (HECC) is much more efficient than RSA and elliptic curve cryptosystem (ECC) for its shorter key lengths. Hyperelliptic curve cryptosystems can be sped up by parallel execution on hardware accelerators, yet none of previous efforts can sufficiently support parallel processing with reasonable resources. In this paper, we propose a new parallel processor architecture for HECC, which supports sufficient instruction-level parallel processing. In the architecture, Parallel finite field (FF) cores are designed, and each core consists of a control unit, a register file, an ALU and a ROM. Instruction-level parallelism (ILP) with pipeline is achieved in this architecture. The results show that the implementation can ...
The performance analysis of Hyperelliptic Curve Cryptosystems (HECC) over prime fields (Fp) of genus...
It is widely recognized that data security will play a central role in future IT systems. Providing ...
De nombreux systèmes numériques nécessitent des primitives de cryptographie asymétrique de plus en p...
Hyperelliptic curve is an extension of elliptic curve cryptography. Shorter key lengths of hyperelli...
Hardware accelerators are often used in cryptographic applications for speeding up the highly arithm...
International audienceRecent research has pointed out Hyper-Elliptic Curve Cryptography (HECC) as an...
Implementing public-key cryptography on platforms with limited resources, such as microprocessors, i...
National audienceWe present our first results on the extension of computation accelerators designed ...
In today's world people are reliant on all kinds of technological devices such as mobile phones and ...
In this paper we describe a high performance, area-efficient implementation of Hyperelliptic Curve C...
This paper presents a reconfigurable curve-based cryptoprocessor that accelerates scalar multiplicat...
ii Security issues play an important role in almost all modern communication and com-puter networks....
We propose a superscalar coprocessor for high-speed curvebased cryptography. It accelerates scalar m...
International audienceElliptic curve cryptography (ECC) is the current main standard for asymmetric ...
International audiencePublic key cryptography is required in many applications such as key exchange,...
The performance analysis of Hyperelliptic Curve Cryptosystems (HECC) over prime fields (Fp) of genus...
It is widely recognized that data security will play a central role in future IT systems. Providing ...
De nombreux systèmes numériques nécessitent des primitives de cryptographie asymétrique de plus en p...
Hyperelliptic curve is an extension of elliptic curve cryptography. Shorter key lengths of hyperelli...
Hardware accelerators are often used in cryptographic applications for speeding up the highly arithm...
International audienceRecent research has pointed out Hyper-Elliptic Curve Cryptography (HECC) as an...
Implementing public-key cryptography on platforms with limited resources, such as microprocessors, i...
National audienceWe present our first results on the extension of computation accelerators designed ...
In today's world people are reliant on all kinds of technological devices such as mobile phones and ...
In this paper we describe a high performance, area-efficient implementation of Hyperelliptic Curve C...
This paper presents a reconfigurable curve-based cryptoprocessor that accelerates scalar multiplicat...
ii Security issues play an important role in almost all modern communication and com-puter networks....
We propose a superscalar coprocessor for high-speed curvebased cryptography. It accelerates scalar m...
International audienceElliptic curve cryptography (ECC) is the current main standard for asymmetric ...
International audiencePublic key cryptography is required in many applications such as key exchange,...
The performance analysis of Hyperelliptic Curve Cryptosystems (HECC) over prime fields (Fp) of genus...
It is widely recognized that data security will play a central role in future IT systems. Providing ...
De nombreux systèmes numériques nécessitent des primitives de cryptographie asymétrique de plus en p...