This thesis deals with issues related to the implementation of cryptography on elliptic curves in a constrained environment such as the Internet of Things (IoT). Elliptic curves are widely deployed in cryptographic applications. These implementations are generally based on the NIST standard. However, since the development of this standard several advances in terms of performance and safety have made. In this thesis, we propose to construct a new set of elliptic curves for the Edwards binary curve model. These new curves will incorporate a number of optimizations specific to32-bit processor architectures. The efficiency of this curve model lies in the use of differential coordinates. However, we will see that this representation is difficult...
La Cryptographie sur les Courbes Elliptiques (abréviée ECC de l'anglais Elliptic Curve Cryptography)...
This PhD thesis focuses on the study, the hardware design, the theoretical and practical validation,...
Abstract The fast growth in Internet‐of‐Things (IoT) applications has increased the number of end‐de...
Cette thèse traite des problématiques relatives aux implémentations de la cryptographie sur les cour...
The use of elliptic curves in cryptography has become widespread to ensure the security of communica...
Elliptic curve based cryptosystems are nowadays increasingly used in protocols involving public-key ...
Les systèmes cryptographiques à base de courbes elliptiques sont aujourd'hui de plus en plus employé...
Elliptic curves (EC) are widely studied due to their mathematical and cryptographic properties. Cryp...
L'usage des courbes elliptiques en cryptographie s'est largement répandu pour assurer la sécurité de...
Many applications require achieving high security level (confidentiality or integrity). My thesis is...
Information security heavily relies on integrated circuits (ICs). Unfortunately, ICs face a lot of t...
Elliptic Curve Cryptography (ECC) has gained much importance in smart cards because of its higher sp...
De nombreuses applications imposent des contraintes de sécurité élevées (notamment au sens confident...
Elliptic curves have become widespread in cryptographic applications since they offer the same crypt...
La Cryptographie sur les Courbes Elliptiques (abréviée ECC de l'anglais Elliptic Curve Cryptography)...
This PhD thesis focuses on the study, the hardware design, the theoretical and practical validation,...
Abstract The fast growth in Internet‐of‐Things (IoT) applications has increased the number of end‐de...
Cette thèse traite des problématiques relatives aux implémentations de la cryptographie sur les cour...
The use of elliptic curves in cryptography has become widespread to ensure the security of communica...
Elliptic curve based cryptosystems are nowadays increasingly used in protocols involving public-key ...
Les systèmes cryptographiques à base de courbes elliptiques sont aujourd'hui de plus en plus employé...
Elliptic curves (EC) are widely studied due to their mathematical and cryptographic properties. Cryp...
L'usage des courbes elliptiques en cryptographie s'est largement répandu pour assurer la sécurité de...
Many applications require achieving high security level (confidentiality or integrity). My thesis is...
Information security heavily relies on integrated circuits (ICs). Unfortunately, ICs face a lot of t...
Elliptic Curve Cryptography (ECC) has gained much importance in smart cards because of its higher sp...
De nombreuses applications imposent des contraintes de sécurité élevées (notamment au sens confident...
Elliptic curves have become widespread in cryptographic applications since they offer the same crypt...
La Cryptographie sur les Courbes Elliptiques (abréviée ECC de l'anglais Elliptic Curve Cryptography)...
This PhD thesis focuses on the study, the hardware design, the theoretical and practical validation,...
Abstract The fast growth in Internet‐of‐Things (IoT) applications has increased the number of end‐de...