De nombreux systèmes numériques nécessitent des primitives de cryptographie asymétrique de plus en plus performantes mais aussi robustes aux attaques et peu coûteuses pour les applications embarquées. Dans cette optique, la cryptographie sur courbe hyperelliptique (HECC) a été proposée comme une alternative intéressante aux techniques actuelles du fait de corps finis plus petits. Nous avons étudié des cryptoprocesseurs HECC matériels performants, flexibles et robustes contre certaines attaques physiques. Tout d’abord, nous avons proposé une nouvelle architecture d’opérateurs exécutant, en parallèle, plusieurs multiplications modulaires (A × B) mod P, où P est un premier générique de quelques centaines de bits et configurable dynamiquement. ...
In this paper we describe a high performance, area-efficient implementation of Hyperelliptic Curve C...
Hyperelliptic curve cryptosystem (HECC) is much more efficient than RSA and elliptic curve cryptosys...
Security issues play an important role in almost all modern communication and computer networks. As ...
Many digital systems require primitives for asymmetric cryptography that are more and more efficient...
National audienceWe present our first results on the extension of computation accelerators designed ...
ii Security issues play an important role in almost all modern communication and com-puter networks....
Implementing public-key cryptography on platforms with limited resources, such as microprocessors, i...
International audienceElliptic curve cryptography (ECC) is the current main standard for asymmetric ...
In today's world people are reliant on all kinds of technological devices such as mobile phones and ...
Hyperelliptic curve is an extension of elliptic curve cryptography. Shorter key lengths of hyperelli...
International audienceOur research group has been studying arithmetic operators and implementations ...
De nombreuses applications imposent des contraintes de sécurité élevées (notamment au sens confident...
International audienceRecent research has pointed out Hyper-Elliptic Curve Cryptography (HECC) as an...
This article, a result of the research project Design of a cryptoprocessor based on hyperelliptic cu...
On the basis of a software implementation of Kummer based HECC over Fp presented in 2016, we propose...
In this paper we describe a high performance, area-efficient implementation of Hyperelliptic Curve C...
Hyperelliptic curve cryptosystem (HECC) is much more efficient than RSA and elliptic curve cryptosys...
Security issues play an important role in almost all modern communication and computer networks. As ...
Many digital systems require primitives for asymmetric cryptography that are more and more efficient...
National audienceWe present our first results on the extension of computation accelerators designed ...
ii Security issues play an important role in almost all modern communication and com-puter networks....
Implementing public-key cryptography on platforms with limited resources, such as microprocessors, i...
International audienceElliptic curve cryptography (ECC) is the current main standard for asymmetric ...
In today's world people are reliant on all kinds of technological devices such as mobile phones and ...
Hyperelliptic curve is an extension of elliptic curve cryptography. Shorter key lengths of hyperelli...
International audienceOur research group has been studying arithmetic operators and implementations ...
De nombreuses applications imposent des contraintes de sécurité élevées (notamment au sens confident...
International audienceRecent research has pointed out Hyper-Elliptic Curve Cryptography (HECC) as an...
This article, a result of the research project Design of a cryptoprocessor based on hyperelliptic cu...
On the basis of a software implementation of Kummer based HECC over Fp presented in 2016, we propose...
In this paper we describe a high performance, area-efficient implementation of Hyperelliptic Curve C...
Hyperelliptic curve cryptosystem (HECC) is much more efficient than RSA and elliptic curve cryptosys...
Security issues play an important role in almost all modern communication and computer networks. As ...