Many digital systems require primitives for asymmetric cryptography that are more and more efficient but also robust to attacks and inexpensive for embedded applications. In this perspective, and thanks to smaller finite fields, hyperelliptic curve cryptography (HECC) has been proposed as an interesting alternative to current techniques. We have studied efficient and flexible hardware HECC cryptoprocessors that are also robust against certain physical attacks. First, we proposed a new operator architecture able to compute, in parallel, several modular multiplications (A × B) mod P, where P is a generic prime of a few hundred bits and configurable at run time. It allows the computation of the vast majority of operations required for HECC. We...
International audienceModular multiplication is the most costly and common operation in hyper-ellipt...
Hyperelliptic curve cryptosystem (HECC) is much more efficient than RSA and elliptic curve cryptosys...
This article, a result of the research project Design of a cryptoprocessor based on hyperelliptic cu...
Many digital systems require primitives for asymmetric cryptography that are more and more efficient...
De nombreux systèmes numériques nécessitent des primitives de cryptographie asymétrique de plus en p...
National audienceWe present our first results on the extension of computation accelerators designed ...
ii Security issues play an important role in almost all modern communication and com-puter networks....
On the basis of a software implementation of Kummer based HECC over Fp presented in 2016, we propose...
International audienceOur research group has been studying arithmetic operators and implementations ...
In today's world people are reliant on all kinds of technological devices such as mobile phones and ...
International audienceRecent research has pointed out Hyper-Elliptic Curve Cryptography (HECC) as an...
Implementing public-key cryptography on platforms with limited resources, such as microprocessors, i...
Security issues play an important role in almost all modern communication and computer networks. As ...
In this paper we describe a high performance, area-efficient implementation of Hyperelliptic Curve C...
International audienceElliptic curve cryptography (ECC) is the current main standard for asymmetric ...
International audienceModular multiplication is the most costly and common operation in hyper-ellipt...
Hyperelliptic curve cryptosystem (HECC) is much more efficient than RSA and elliptic curve cryptosys...
This article, a result of the research project Design of a cryptoprocessor based on hyperelliptic cu...
Many digital systems require primitives for asymmetric cryptography that are more and more efficient...
De nombreux systèmes numériques nécessitent des primitives de cryptographie asymétrique de plus en p...
National audienceWe present our first results on the extension of computation accelerators designed ...
ii Security issues play an important role in almost all modern communication and com-puter networks....
On the basis of a software implementation of Kummer based HECC over Fp presented in 2016, we propose...
International audienceOur research group has been studying arithmetic operators and implementations ...
In today's world people are reliant on all kinds of technological devices such as mobile phones and ...
International audienceRecent research has pointed out Hyper-Elliptic Curve Cryptography (HECC) as an...
Implementing public-key cryptography on platforms with limited resources, such as microprocessors, i...
Security issues play an important role in almost all modern communication and computer networks. As ...
In this paper we describe a high performance, area-efficient implementation of Hyperelliptic Curve C...
International audienceElliptic curve cryptography (ECC) is the current main standard for asymmetric ...
International audienceModular multiplication is the most costly and common operation in hyper-ellipt...
Hyperelliptic curve cryptosystem (HECC) is much more efficient than RSA and elliptic curve cryptosys...
This article, a result of the research project Design of a cryptoprocessor based on hyperelliptic cu...