Elliptic curve cryptography (ECC) is a type of public-key cryptosystem which uses the additive group of points on a nonsingular elliptic curve as a cryptographic medium. Koblitz curves are special elliptic curves that have unique properties which allow scalar multiplication, the bottleneck operation in most ECC cryptosystems, to be performed very efficiently. Optimizing the scalar multiplication operation on Koblitz curves is an active area of research with many proposed algorithms for FPGA and software implementations. As of yet little to no research has been reported on using the capabilities of hybrid FPGAs, such as the Xilinx Virtex-4 FX series, which would allow for the design of a more flexible single-chip system that performs scalar ...
Elliptic Curve Cryptosystems (ECC) were introduced in 1985 by Neal Koblitz and Victor Miller. Small ...
We propose a lightweight coprocessor for 16-bit microcontrollers that implements high security ellip...
Abstract: Embedded systems find applications in fields such as defense, communications, industrial a...
We design a state-of-the-art software implementation of field and elliptic curve arithmetic in stand...
Elliptic curve cryptography (ECC) offers a viable alternative to Rivest-Shamir-Adleman (RSA) by deli...
The elliptic curve cryptography (ECC) has been identified as an efficient scheme for public-key cryp...
This paper presents an area efficient and high-speed FPGA implementation of scalar multiplication us...
We present an algorithm that by using the τ and τ-1 Frobenius operators concurrently allows us to ob...
© 2015 IEEE. Koblitz curves are a class of computationally efficient elliptic curves where scalar mu...
© Springer International Publishing Switzerland 2015. Koblitz curves allow very efficient scalar mul...
I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, includ...
Empirical thesis.Bibliography: pages 91-92.1. Introduction -- 2. Background and related work -- 3. E...
The paper is an examination of double-base decompositions of integers $n$, namely expansions loosely...
It is widely recognized that data security, influence ofprocessor types used, resources and the arch...
Part 2: Security EngineeringInternational audienceScalar multiplication is the most expensive arithm...
Elliptic Curve Cryptosystems (ECC) were introduced in 1985 by Neal Koblitz and Victor Miller. Small ...
We propose a lightweight coprocessor for 16-bit microcontrollers that implements high security ellip...
Abstract: Embedded systems find applications in fields such as defense, communications, industrial a...
We design a state-of-the-art software implementation of field and elliptic curve arithmetic in stand...
Elliptic curve cryptography (ECC) offers a viable alternative to Rivest-Shamir-Adleman (RSA) by deli...
The elliptic curve cryptography (ECC) has been identified as an efficient scheme for public-key cryp...
This paper presents an area efficient and high-speed FPGA implementation of scalar multiplication us...
We present an algorithm that by using the τ and τ-1 Frobenius operators concurrently allows us to ob...
© 2015 IEEE. Koblitz curves are a class of computationally efficient elliptic curves where scalar mu...
© Springer International Publishing Switzerland 2015. Koblitz curves allow very efficient scalar mul...
I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, includ...
Empirical thesis.Bibliography: pages 91-92.1. Introduction -- 2. Background and related work -- 3. E...
The paper is an examination of double-base decompositions of integers $n$, namely expansions loosely...
It is widely recognized that data security, influence ofprocessor types used, resources and the arch...
Part 2: Security EngineeringInternational audienceScalar multiplication is the most expensive arithm...
Elliptic Curve Cryptosystems (ECC) were introduced in 1985 by Neal Koblitz and Victor Miller. Small ...
We propose a lightweight coprocessor for 16-bit microcontrollers that implements high security ellip...
Abstract: Embedded systems find applications in fields such as defense, communications, industrial a...