The number of smart devices connected to the Internet is growing at an enormous pace and will reach 30 billion within the next five years. A large fraction of these devices have limited processing capabilities and energy supply, which makes the execution of computation-intensive cryptographic algorithms very costly. This problem is exacerbated by the fact that basic optimization techniques like loop unrolling can not (always) be applied since cryptographic software for the IoT often needs to meet strict constraints on code size to not exceed the program storage capacity of the target device. In this paper we introduce SECCCM3, a "lightweight" software library for scalable elliptic curve cryptography on ARM Cortex-M3 microcontrollers. The cu...
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low late...
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low late...
This paper is the first to investigate the power of the Cell Broadband Engine for state-of-the-art p...
peer reviewedThe number of smart devices connected to the Internet is growing at an enormous pace an...
peer reviewedThe Internet is rapidly evolving from a network of personal computers and servers to a ...
peer reviewedPublic-Key Cryptography (PKC) is an indispensable building block of modern security pro...
peer reviewedIt is widely accepted that public-key cryptosystems play a major role in the security a...
peer reviewedWireless Sensor Networks (WSNs) are susceptible to a wide range of malicious attacks, w...
peer reviewedIn this paper, we present a highly-optimized implementation of standards-compliant Elli...
This work deals with the energy-efficient, high-speed and high-security implementation of elliptic c...
In this paper, we present memory-efficient and scalable implementations of NIST standardized ellipti...
As the amount of information exchanged through the network grows, so does the demand for increased s...
Security of data in the Internet of Things (IoT) deals with Encryption to provide a stable secure sy...
peer reviewedWe introduce a set of four twisted Edwards curves that satisfy common security requirem...
International audienceElliptic Curve Cryptography (ECC) is becoming unavoidable, and should be used ...
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low late...
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low late...
This paper is the first to investigate the power of the Cell Broadband Engine for state-of-the-art p...
peer reviewedThe number of smart devices connected to the Internet is growing at an enormous pace an...
peer reviewedThe Internet is rapidly evolving from a network of personal computers and servers to a ...
peer reviewedPublic-Key Cryptography (PKC) is an indispensable building block of modern security pro...
peer reviewedIt is widely accepted that public-key cryptosystems play a major role in the security a...
peer reviewedWireless Sensor Networks (WSNs) are susceptible to a wide range of malicious attacks, w...
peer reviewedIn this paper, we present a highly-optimized implementation of standards-compliant Elli...
This work deals with the energy-efficient, high-speed and high-security implementation of elliptic c...
In this paper, we present memory-efficient and scalable implementations of NIST standardized ellipti...
As the amount of information exchanged through the network grows, so does the demand for increased s...
Security of data in the Internet of Things (IoT) deals with Encryption to provide a stable secure sy...
peer reviewedWe introduce a set of four twisted Edwards curves that satisfy common security requirem...
International audienceElliptic Curve Cryptography (ECC) is becoming unavoidable, and should be used ...
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low late...
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low late...
This paper is the first to investigate the power of the Cell Broadband Engine for state-of-the-art p...