Cette thèse traite des problématiques relatives aux implémentations de la cryptographie sur les courbes elliptiques dans un environnement contraint tel que l’Internet des Objets (IoT). Les courbes elliptiques sont largement déployées au sein d’applications cryptographiques. Ces implémentations sont généralement basées sur le standard du NIST. Cependant, de nombreuses avancées en terme de performance et de sécurité ont été faites depuis l’élaboration de ce standard. Nous nous proposons dans cette thèse de construire un nouvel ensemble de courbes elliptiques pour le modèle de courbes binaires d’Edwards. Ces nouvelles courbes intègreront dès leur conception un certain nombre d’optimisations spécifiques aux architectures de processeurs de 32 bi...
To protect data confidentiality, cryptographic methods are widely used, however, traditional methods...
While the internet of things (IoT) promises many advances for businesses, administrations and citize...
Elliptic curves (EC) are widely studied due to their mathematical and cryptographic properties. Cryp...
This thesis deals with issues related to the implementation of cryptography on elliptic curves in a ...
Les systèmes cryptographiques à base de courbes elliptiques sont aujourd'hui de plus en plus employé...
Abstract The fast growth in Internet‐of‐Things (IoT) applications has increased the number of end‐de...
Internet-of-Things is a modern concept that provides marvelous opportunities for several innovative ...
De nombreuses applications imposent des contraintes de sécurité élevées (notamment au sens confident...
International audienceEven if recent advances in public key cryptography tend to focus on algorithms...
The use of elliptic curves in cryptography has become widespread to ensure the security of communica...
Si l’internet des objets laisse entrevoir de nouvelles perspectives, tantpour les entreprises que po...
The emerging Internet of Things (IoT) technology interconnects billions of embedded devices with eac...
Today’s developing era data and information security plays an important role in unsecured communicat...
peer reviewedVerification of an ECDSA signature requires a double scalar multiplication on an ellipt...
Elliptic curve based cryptosystems are nowadays increasingly used in protocols involving public-key ...
To protect data confidentiality, cryptographic methods are widely used, however, traditional methods...
While the internet of things (IoT) promises many advances for businesses, administrations and citize...
Elliptic curves (EC) are widely studied due to their mathematical and cryptographic properties. Cryp...
This thesis deals with issues related to the implementation of cryptography on elliptic curves in a ...
Les systèmes cryptographiques à base de courbes elliptiques sont aujourd'hui de plus en plus employé...
Abstract The fast growth in Internet‐of‐Things (IoT) applications has increased the number of end‐de...
Internet-of-Things is a modern concept that provides marvelous opportunities for several innovative ...
De nombreuses applications imposent des contraintes de sécurité élevées (notamment au sens confident...
International audienceEven if recent advances in public key cryptography tend to focus on algorithms...
The use of elliptic curves in cryptography has become widespread to ensure the security of communica...
Si l’internet des objets laisse entrevoir de nouvelles perspectives, tantpour les entreprises que po...
The emerging Internet of Things (IoT) technology interconnects billions of embedded devices with eac...
Today’s developing era data and information security plays an important role in unsecured communicat...
peer reviewedVerification of an ECDSA signature requires a double scalar multiplication on an ellipt...
Elliptic curve based cryptosystems are nowadays increasingly used in protocols involving public-key ...
To protect data confidentiality, cryptographic methods are widely used, however, traditional methods...
While the internet of things (IoT) promises many advances for businesses, administrations and citize...
Elliptic curves (EC) are widely studied due to their mathematical and cryptographic properties. Cryp...