8-bit microcontrollers like the 8051 still hold a considerable share of the embedded systems market and dominate in the smart card industry. The performance of 8-bit microcontrollers is often too poor for the implementation of public-key cryptography in software. In this paper we present a minimalist hardware accelerator for enabling elliptic curve cryptography (ECC) on an 8051 microcontroller. We demonstrate the importance of removing system-level performance bottlenecks caused by the transfer of operands between hardware accelerator and external RAM. The integration of a small direct memory access (DMA) unit proves vital to exploit the full potential of the hardware accelerator. Our design allows to perform a scalar multiplication over th...
Today, many resource-constrained systems, such as embedded systems, still rely on symmetric cryptogr...
In this paper we explore different hardware accelerators for cryptography based on elliptic curves. ...
Implementing large word-length public key algorithms on small 8-bit μ-controllers is a challenge. Th...
Part 4: Implementations and Hardware Security 1International audienceElliptic Curve Cryptography (EC...
It is a challenge to implement large word length public-key algorithms on embedded systems. Examples...
It is a challenge to implement large word length public-key algorithms on embedded systems. Examples...
ii This thesis describes how an elliptic curve cryptosystem can be implemented on low cost microproc...
Abstract: Embedded systems find applications in fields such as defense, communications, industrial a...
Abstract This contribution describes how an elliptic curve cryptosystem can be imple-mented on very ...
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low late...
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low late...
Abstract. This contribution describes a methodology used to eciently implement elliptic curves (EC) ...
This paper proposes a hardware-efficient elliptic curve cryptography (ECC) architecture over GF(p), ...
Abstract—Elliptic Curve Cryptography (ECC) is popular for digital signatures and other public-key cr...
Abstract. The strength of ECC lies in the hardness of elliptic curve discrete logarithm problem (ECD...
Today, many resource-constrained systems, such as embedded systems, still rely on symmetric cryptogr...
In this paper we explore different hardware accelerators for cryptography based on elliptic curves. ...
Implementing large word-length public key algorithms on small 8-bit μ-controllers is a challenge. Th...
Part 4: Implementations and Hardware Security 1International audienceElliptic Curve Cryptography (EC...
It is a challenge to implement large word length public-key algorithms on embedded systems. Examples...
It is a challenge to implement large word length public-key algorithms on embedded systems. Examples...
ii This thesis describes how an elliptic curve cryptosystem can be implemented on low cost microproc...
Abstract: Embedded systems find applications in fields such as defense, communications, industrial a...
Abstract This contribution describes how an elliptic curve cryptosystem can be imple-mented on very ...
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low late...
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low late...
Abstract. This contribution describes a methodology used to eciently implement elliptic curves (EC) ...
This paper proposes a hardware-efficient elliptic curve cryptography (ECC) architecture over GF(p), ...
Abstract—Elliptic Curve Cryptography (ECC) is popular for digital signatures and other public-key cr...
Abstract. The strength of ECC lies in the hardness of elliptic curve discrete logarithm problem (ECD...
Today, many resource-constrained systems, such as embedded systems, still rely on symmetric cryptogr...
In this paper we explore different hardware accelerators for cryptography based on elliptic curves. ...
Implementing large word-length public key algorithms on small 8-bit μ-controllers is a challenge. Th...