[Updated version of paper at Indocrypt 2010] A major cryptanalytic computation is currently underway on multiple platforms, including standard CPUs, FPGAs, PlayStations and GPUs, to break the Certicom ECC2K-130 challenge. This challenge is to compute an elliptic-curve discrete logarithm on a Koblitz curve over F_2^131 . Optimizations have reduced the cost of the computation to approximately 2^77 bit operations in 2^61 iterations. GPUs are not designed for fast binary-field arithmetic; they are designed for highly vectorizable floating-point computations that fit into very small amounts of static RAM. This paper explains how to optimize the ECC2K-130 computation for this unusual platform. The resulting GPU software performs more than 63 mill...
I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, includ...
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low late...
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low late...
[Updated version of paper at Indocrypt 2010] A major cryptanalytic computation is currently underway...
This paper reports record-setting performance for the elliptic-curve method of integer factorization...
This paper accelerates FPGA computations of discrete logarithms on elliptic curves over binary field...
This paper presents the design of a high-speed coprocessor for Elliptic Curve Cryptography over bina...
The Elliptic Curve Method (ECM) is the method of choice for nding medium-size prime factors. A good...
International audience—Acceleration of cryptographic applications on Graphical Processing Units (GPU...
This paper presents a low-latency algorithm designed for parallel computer architectures to compute ...
Elliptic curve cryptography (ECC) offers a viable alternative to Rivest-Shamir-Adleman (RSA) by deli...
Empirical thesis.Bibliography: pages 339-362.1. Introduction -- 2. Background -- 3. Efficient hardwa...
The vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags ...
© International Association for Cryptologic Research 2015. We propose a lightweight coprocessor for ...
Elliptic Curve Cryptography (ECC) is one of the most popular public-key cryptosystems (PKC) today. R...
I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, includ...
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low late...
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low late...
[Updated version of paper at Indocrypt 2010] A major cryptanalytic computation is currently underway...
This paper reports record-setting performance for the elliptic-curve method of integer factorization...
This paper accelerates FPGA computations of discrete logarithms on elliptic curves over binary field...
This paper presents the design of a high-speed coprocessor for Elliptic Curve Cryptography over bina...
The Elliptic Curve Method (ECM) is the method of choice for nding medium-size prime factors. A good...
International audience—Acceleration of cryptographic applications on Graphical Processing Units (GPU...
This paper presents a low-latency algorithm designed for parallel computer architectures to compute ...
Elliptic curve cryptography (ECC) offers a viable alternative to Rivest-Shamir-Adleman (RSA) by deli...
Empirical thesis.Bibliography: pages 339-362.1. Introduction -- 2. Background -- 3. Efficient hardwa...
The vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags ...
© International Association for Cryptologic Research 2015. We propose a lightweight coprocessor for ...
Elliptic Curve Cryptography (ECC) is one of the most popular public-key cryptosystems (PKC) today. R...
I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, includ...
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low late...
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low late...