National audienceEnsuring uniform computation profiles is an efficient protection against some side channel attacks (SCA) in embedded systems. Typical elliptic curve cryptography (ECC) scalar multiplication methods use two point operations (addition and doubling) scheduled according to secret scalar digits. Euclidean addition chains (EAC) offer a natural SCA protection since only one point operation is used. Computing short EACs is considered as a very costly operation and no hardware implementation has been reported yet. We designed an hardware recoding unit for short EACs which works concurrently to scalar multiplication. It has been integrated in an in-house ECC processor on various FPGAs. The implementation results show similar computat...
International audienceIn elliptic curve cryptography (ECC), arithmetic is a key element for designin...
Elliptic curve cryptography (ECC) is probably the most popular public key systems nowadays. The clas...
International audienceArithmetic algorithms and number representations play a key role in computatio...
National audienceEnsuring uniform computation profiles is an efficient protection against some side ...
International audienceElliptic Curve Cryptography (ECC) is becoming unavoidable, and should be used ...
This paper presents a series of Montgomery scalar multiplication algorithms on general short Weierst...
International audienceScalar recoding is popular to speed up ECC scalar multiplication: non-adjacent...
International audienceOur research group has been studying arithmetic operators and implementations ...
The technology of elliptic curve cryptography is now an important branch in public-key based crypto-...
Elliptic Curve Cryptosystems (ECC) were introduced in 1985 by Neal Koblitz and Victor Miller. Small ...
High throughput while maintaining low resource is a key issue for elliptic curve cryptography (ECC) ...
National audienceWe present our first results on the extension of computation accelerators designed ...
International audienceScalar multiplication is the main operation in elliptic curve cryptography. In...
Empirical thesis.Bibliography: pages 91-92.1. Introduction -- 2. Background and related work -- 3. E...
Abstract: Embedded systems find applications in fields such as defense, communications, industrial a...
International audienceIn elliptic curve cryptography (ECC), arithmetic is a key element for designin...
Elliptic curve cryptography (ECC) is probably the most popular public key systems nowadays. The clas...
International audienceArithmetic algorithms and number representations play a key role in computatio...
National audienceEnsuring uniform computation profiles is an efficient protection against some side ...
International audienceElliptic Curve Cryptography (ECC) is becoming unavoidable, and should be used ...
This paper presents a series of Montgomery scalar multiplication algorithms on general short Weierst...
International audienceScalar recoding is popular to speed up ECC scalar multiplication: non-adjacent...
International audienceOur research group has been studying arithmetic operators and implementations ...
The technology of elliptic curve cryptography is now an important branch in public-key based crypto-...
Elliptic Curve Cryptosystems (ECC) were introduced in 1985 by Neal Koblitz and Victor Miller. Small ...
High throughput while maintaining low resource is a key issue for elliptic curve cryptography (ECC) ...
National audienceWe present our first results on the extension of computation accelerators designed ...
International audienceScalar multiplication is the main operation in elliptic curve cryptography. In...
Empirical thesis.Bibliography: pages 91-92.1. Introduction -- 2. Background and related work -- 3. E...
Abstract: Embedded systems find applications in fields such as defense, communications, industrial a...
International audienceIn elliptic curve cryptography (ECC), arithmetic is a key element for designin...
Elliptic curve cryptography (ECC) is probably the most popular public key systems nowadays. The clas...
International audienceArithmetic algorithms and number representations play a key role in computatio...