Many resource-constrained systems still rely on symmetric cryptography for verification and authentication. Asymmetric cryptographic systems provide higher security levels, but are very computational intensive. Hence, embedded systems can benefit from hardware assistance, i.e., coprocessors optimized for the required public key operations. In this work, we propose an elliptic curve cryptographic coprocessors design for resource-constrained systems. Many such coprocessor designs consider only special (Solinas) prime fields, which enable a low-complexity modulo arithmetic. Other implementations support arbitrary prime curves using the Montgomery reduction. These implementations typically require more time for the point multiplication. We pres...
This paper describes a hardware implementation of an arithmetic processor which is efficient for bit...
The technology of elliptic curve cryptography is now an important branch in public-key based crypto-...
We propose a superscalar coprocessor for high-speed curvebased cryptography. It accelerates scalar m...
Today, many resource-constrained systems, such as embedded systems, still rely on symmetric cryptogr...
Abstract. We present a new hardware architecture to compute scalar multiplications in the group of r...
This work presents a new concept to implement the elliptic curve point multiplication (PM). This com...
Abstract — We present a custom class of primes using modular scaling that facilitate efficient finit...
This paper presents an elliptic curve cryptography processor for prime fields implemented on a FPGA-...
This paper proposes an FPGA-based application-specific elliptic curve processor over a prime field. ...
The vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags ...
Abstract-- This survey paper reviews latest existing encryption techniques and their security issues...
In this paper, we present memory-efficient and scalable implementations of NIST standardized ellipti...
Abstract. It has been recently shown that sharing a common coordi-nate in elliptic curve cryptograph...
Abstract: The Elliptic Curve Cryptosystem shortly called as (ECC) is one of the asymmetric key crypt...
Recently, considerable research has been performed in cryptography and security to optimize the area...
This paper describes a hardware implementation of an arithmetic processor which is efficient for bit...
The technology of elliptic curve cryptography is now an important branch in public-key based crypto-...
We propose a superscalar coprocessor for high-speed curvebased cryptography. It accelerates scalar m...
Today, many resource-constrained systems, such as embedded systems, still rely on symmetric cryptogr...
Abstract. We present a new hardware architecture to compute scalar multiplications in the group of r...
This work presents a new concept to implement the elliptic curve point multiplication (PM). This com...
Abstract — We present a custom class of primes using modular scaling that facilitate efficient finit...
This paper presents an elliptic curve cryptography processor for prime fields implemented on a FPGA-...
This paper proposes an FPGA-based application-specific elliptic curve processor over a prime field. ...
The vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags ...
Abstract-- This survey paper reviews latest existing encryption techniques and their security issues...
In this paper, we present memory-efficient and scalable implementations of NIST standardized ellipti...
Abstract. It has been recently shown that sharing a common coordi-nate in elliptic curve cryptograph...
Abstract: The Elliptic Curve Cryptosystem shortly called as (ECC) is one of the asymmetric key crypt...
Recently, considerable research has been performed in cryptography and security to optimize the area...
This paper describes a hardware implementation of an arithmetic processor which is efficient for bit...
The technology of elliptic curve cryptography is now an important branch in public-key based crypto-...
We propose a superscalar coprocessor for high-speed curvebased cryptography. It accelerates scalar m...