National audienceEnsuring uniform computation profiles is an efficient protection against some side channel attacks (SCA) in embedded systems. Typical elliptic curve cryptography (ECC) scalar multiplication methods use two point operations (addition and doubling) scheduled according to secret scalar digits. Euclidean addition chains (EAC) offer a natural SCA protection since only one point operation is used. Computing short EACs is considered as a very costly operation and no hardware implementation has been reported yet. We designed an hardware recoding unit for short EACs which works concurrently to scalar multiplication. It has been integrated in an in-house ECC processor on various FPGAs. The implementation results show similar computat...
International audienceOur research group has been studying arithmetic operators and implementations ...
International audienceEmbedded systems support more and more features. Authentication and confidenti...
Elliptic Curve Cryptosystems (ECC) have been proposed as an alternative to other established public ...
National audienceEnsuring uniform computation profiles is an efficient protection against some side ...
Abstract: Embedded systems find applications in fields such as defense, communications, industrial a...
Empirical thesis.Bibliography: pages 91-92.1. Introduction -- 2. Background and related work -- 3. E...
International audienceArithmetic algorithms and number representations play a key role in computatio...
Elliptic curve cryptography (ECC) offers a viable alternative to Rivest-Shamir-Adleman (RSA) by deli...
International audienceIn elliptic curve cryptography (ECC), arithmetic is a key element for designin...
International audienceElliptic Curve Cryptography (ECC) is becoming unavoidable, and should be used ...
This paper proposes a hardware-efficient elliptic curve cryptography (ECC) architecture over GF(p), ...
Elliptic Curve Cryptosystem (ECC) is one of the most advantageous cryptosystems because of the short...
The elliptic curve cryptosystem (ECC) has been proven to be vulnerable to non-invasive side-channel ...
Elliptic Curve Cryptosystem (ECC) is one of the most advantageous cryptosystems because of the short...
This paper presents implementation results of several side channel countermeasures for protecting th...
International audienceOur research group has been studying arithmetic operators and implementations ...
International audienceEmbedded systems support more and more features. Authentication and confidenti...
Elliptic Curve Cryptosystems (ECC) have been proposed as an alternative to other established public ...
National audienceEnsuring uniform computation profiles is an efficient protection against some side ...
Abstract: Embedded systems find applications in fields such as defense, communications, industrial a...
Empirical thesis.Bibliography: pages 91-92.1. Introduction -- 2. Background and related work -- 3. E...
International audienceArithmetic algorithms and number representations play a key role in computatio...
Elliptic curve cryptography (ECC) offers a viable alternative to Rivest-Shamir-Adleman (RSA) by deli...
International audienceIn elliptic curve cryptography (ECC), arithmetic is a key element for designin...
International audienceElliptic Curve Cryptography (ECC) is becoming unavoidable, and should be used ...
This paper proposes a hardware-efficient elliptic curve cryptography (ECC) architecture over GF(p), ...
Elliptic Curve Cryptosystem (ECC) is one of the most advantageous cryptosystems because of the short...
The elliptic curve cryptosystem (ECC) has been proven to be vulnerable to non-invasive side-channel ...
Elliptic Curve Cryptosystem (ECC) is one of the most advantageous cryptosystems because of the short...
This paper presents implementation results of several side channel countermeasures for protecting th...
International audienceOur research group has been studying arithmetic operators and implementations ...
International audienceEmbedded systems support more and more features. Authentication and confidenti...
Elliptic Curve Cryptosystems (ECC) have been proposed as an alternative to other established public ...