Protocols for asymmetric cryptography require arithmetic computations in several mathematical structures. In particular, many of them need computations in finite structures, imposing an efficient modular arithmetic. These modular calculations are composed of multiprecision operations between operands of sizes large enough to insure the required level of security (between several hundred and several thousand of bits). Finally, some protocols need arithmetic operations in the group of points of an elliptic curve, which are themselves composed of modular computations. The sizes of the keys used by the protocols make the arithmetic computations expansive in terms of execution time. Nowadays, current architectures have several computing units, w...
The higher computational complexity of an elliptic curve scalar point multiplication operation limit...
Abstract. Given a positive integer n and a point P on an elliptic curve E, the computation of nP, th...
This paper presents the design and implementation of an elliptic curve cryptographic core to realize...
Les protocoles de cryptographie asymétrique nécessitent des calculs arithmétiques dans différentes s...
In this PhD thesis I propose coprocessors architectures for high performance computations of asymmet...
International audienceWe present below our first implementation results on a modular arithmetic libr...
National audienceThe scalar multiplication is the main operation of cryptographic protocols based on...
This paper presents a low-latency algorithm designed for parallel computer architectures to compute ...
The elliptic curve cryptography can be observed as two levels of computations, upper scalar multipli...
The technology of elliptic curve cryptography is now an important branch in public-key based crypto-...
Abstract. We present a new hardware architecture to compute scalar multiplications in the group of r...
Cryptography and security market is growing up at an annual rate of 17 % according to some recent st...
Accelerating scalar multiplication has always been a significant topic when people talk about the el...
Les couplages sont des primitives cryptographiques qui interviennent désormais dans de nombreux prot...
La multiplication modulaire est l'opération principale de la plupart des protocoles de cryptographie...
The higher computational complexity of an elliptic curve scalar point multiplication operation limit...
Abstract. Given a positive integer n and a point P on an elliptic curve E, the computation of nP, th...
This paper presents the design and implementation of an elliptic curve cryptographic core to realize...
Les protocoles de cryptographie asymétrique nécessitent des calculs arithmétiques dans différentes s...
In this PhD thesis I propose coprocessors architectures for high performance computations of asymmet...
International audienceWe present below our first implementation results on a modular arithmetic libr...
National audienceThe scalar multiplication is the main operation of cryptographic protocols based on...
This paper presents a low-latency algorithm designed for parallel computer architectures to compute ...
The elliptic curve cryptography can be observed as two levels of computations, upper scalar multipli...
The technology of elliptic curve cryptography is now an important branch in public-key based crypto-...
Abstract. We present a new hardware architecture to compute scalar multiplications in the group of r...
Cryptography and security market is growing up at an annual rate of 17 % according to some recent st...
Accelerating scalar multiplication has always been a significant topic when people talk about the el...
Les couplages sont des primitives cryptographiques qui interviennent désormais dans de nombreux prot...
La multiplication modulaire est l'opération principale de la plupart des protocoles de cryptographie...
The higher computational complexity of an elliptic curve scalar point multiplication operation limit...
Abstract. Given a positive integer n and a point P on an elliptic curve E, the computation of nP, th...
This paper presents the design and implementation of an elliptic curve cryptographic core to realize...