Hyperelliptic curve is an extension of elliptic curve cryptography. Shorter key lengths of hyperellitic curve cryptosystems (HECC) can be used to achieve same level of security comparing to RSA and elliptic curve cryptosystem (ECC). A parallel architecture for field programmable gate array (FPGA) based hyperelliptic curve cryptoprocessor is designed in this paper. The processor is composed of parallel finite field (FF) cores, and each core consists of a control unit, a register file and an ALU. Through sharing mechanism of register files, the independent cores can collaborate to fulfill complicated computations. Each ALU can execute customized instruction A(B+C) +D, and the instruction can be flexibly configured in the instruction generatio...
International audienceRecent research has pointed out Hyper-Elliptic Curve Cryptography (HECC) as an...
In this paper we describe a high performance, area-efficient implementation of Hyperelliptic Curve C...
The general trend of the hardware implementation of elliptic curve cryptography is to increase throu...
Hyperelliptic curve cryptosystem (HECC) is much more efficient than RSA and elliptic curve cryptosys...
ii Security issues play an important role in almost all modern communication and com-puter networks....
In today's world people are reliant on all kinds of technological devices such as mobile phones and ...
提出了一种超椭圆曲线密码处理器并行结构设计.处理器由多个具有相同结构的核组成,每个核由一个控制器、一个寄存器文件、一个运算单元组成,多个独立的核之间通过寄存器共享进行通信来协作完成复杂运算.每个运算单...
International audienceElliptic curve cryptography (ECC) is the current main standard for asymmetric ...
Implementing public-key cryptography on platforms with limited resources, such as microprocessors, i...
International audiencePublic key cryptography is required in many applications such as key exchange,...
National audienceWe present our first results on the extension of computation accelerators designed ...
De nombreux systèmes numériques nécessitent des primitives de cryptographie asymétrique de plus en p...
This paper presents a reconfigurable curve-based cryptoprocessor that accelerates scalar multiplicat...
International audienceOur research group has been studying arithmetic operators and implementations ...
Hardware accelerators are often used in cryptographic applications for speeding up the highly arithm...
International audienceRecent research has pointed out Hyper-Elliptic Curve Cryptography (HECC) as an...
In this paper we describe a high performance, area-efficient implementation of Hyperelliptic Curve C...
The general trend of the hardware implementation of elliptic curve cryptography is to increase throu...
Hyperelliptic curve cryptosystem (HECC) is much more efficient than RSA and elliptic curve cryptosys...
ii Security issues play an important role in almost all modern communication and com-puter networks....
In today's world people are reliant on all kinds of technological devices such as mobile phones and ...
提出了一种超椭圆曲线密码处理器并行结构设计.处理器由多个具有相同结构的核组成,每个核由一个控制器、一个寄存器文件、一个运算单元组成,多个独立的核之间通过寄存器共享进行通信来协作完成复杂运算.每个运算单...
International audienceElliptic curve cryptography (ECC) is the current main standard for asymmetric ...
Implementing public-key cryptography on platforms with limited resources, such as microprocessors, i...
International audiencePublic key cryptography is required in many applications such as key exchange,...
National audienceWe present our first results on the extension of computation accelerators designed ...
De nombreux systèmes numériques nécessitent des primitives de cryptographie asymétrique de plus en p...
This paper presents a reconfigurable curve-based cryptoprocessor that accelerates scalar multiplicat...
International audienceOur research group has been studying arithmetic operators and implementations ...
Hardware accelerators are often used in cryptographic applications for speeding up the highly arithm...
International audienceRecent research has pointed out Hyper-Elliptic Curve Cryptography (HECC) as an...
In this paper we describe a high performance, area-efficient implementation of Hyperelliptic Curve C...
The general trend of the hardware implementation of elliptic curve cryptography is to increase throu...