This paper is devoted to the design of a 258- bit multiplier for computing pairings over Barreto-Naehrig (BN) curves at 128-bit security level. The proposed design is optimized for Xilinx field programmable gate array (FPGA). Each 258-bit integer is represented as a polynomial with five,65 bit signed integer, coefficients . Exploiting this splitting we designed a pipelined 65-bit multiplier based on new Karatsuba-Ofman variant using non-standard splitting to fit to the Xilinx embedded digital signal processor (DSP) blocks. Our architecture is able to compute 258-bit multiplication suitable for BN curves using only 11 in-built DSP blocks available on Virtex-6 Xilinx FPGA devices. It is the least DSP blocks consumption in the known literature...
International audienceIn this paper we provide a comparison of different modular multipliers suitabl...
Abstract This paper presents new software speed records for the computation of cryptographic pairing...
To have an efficient asymmetric key encryption scheme, such as el-liptic curves, hyperelliptic curve...
This paper is devoted to the design of a 258-bit multiplier for computing pairings over Barreto-Naeh...
While FPGA is a suitable platform for implementing cryptographic algorithms, there are several chall...
To have an efficient asymmetric key encryption scheme such as elliptic curves, hyperelliptic curves,...
New Number Field Sieves (NFS) attacks on the discrete logarithm problem have led to increase the key...
This paper presents a novel method for designing compact yet efficient hardware implementations of t...
This paper describes the design of a fast software library for the computation of the optimal ate pa...
This paper describes a new method to speed up Fp-arithmetic for Barreto-Naehrig (BN) curves. We expl...
Following the emergence of Kim and Barbulescu\u27s new number field sieve (exTNFS) algorithm at CRYP...
International audienceSince their introduction in constructive cryptographic applications, pairings ...
Abstract—This paper describes a new method to speed up Fp-arithmetic in hardware for pairing-friendl...
Bilinear pairings can be used to construct cryptographic systems with very desirable properties. A p...
This paper describes a new method to speed up IF p-arithmetic in hardware for pairing-friendly curve...
International audienceIn this paper we provide a comparison of different modular multipliers suitabl...
Abstract This paper presents new software speed records for the computation of cryptographic pairing...
To have an efficient asymmetric key encryption scheme, such as el-liptic curves, hyperelliptic curve...
This paper is devoted to the design of a 258-bit multiplier for computing pairings over Barreto-Naeh...
While FPGA is a suitable platform for implementing cryptographic algorithms, there are several chall...
To have an efficient asymmetric key encryption scheme such as elliptic curves, hyperelliptic curves,...
New Number Field Sieves (NFS) attacks on the discrete logarithm problem have led to increase the key...
This paper presents a novel method for designing compact yet efficient hardware implementations of t...
This paper describes the design of a fast software library for the computation of the optimal ate pa...
This paper describes a new method to speed up Fp-arithmetic for Barreto-Naehrig (BN) curves. We expl...
Following the emergence of Kim and Barbulescu\u27s new number field sieve (exTNFS) algorithm at CRYP...
International audienceSince their introduction in constructive cryptographic applications, pairings ...
Abstract—This paper describes a new method to speed up Fp-arithmetic in hardware for pairing-friendl...
Bilinear pairings can be used to construct cryptographic systems with very desirable properties. A p...
This paper describes a new method to speed up IF p-arithmetic in hardware for pairing-friendly curve...
International audienceIn this paper we provide a comparison of different modular multipliers suitabl...
Abstract This paper presents new software speed records for the computation of cryptographic pairing...
To have an efficient asymmetric key encryption scheme, such as el-liptic curves, hyperelliptic curve...