Lightweight elliptic curve cryptography accelerator for internet of things applications
Authentication, encryption, signatures, and key agreements are public key cryptography
(PKC) services required in certain Internet of Things (IoT) applications (such as healthcare …
(PKC) services required in certain Internet of Things (IoT) applications (such as healthcare …
Field Programmable Gate Array based elliptic curve Menezes‐Qu‐Vanstone key agreement protocol realization using Physical Unclonable Function and true random …
The trust, authenticity and integrity of Internet‐of‐Things (IoT) systems are heavily reliant on
Physical Unclonable Functions (PUFs) and True random number generators (TRNGs). The …
Physical Unclonable Functions (PUFs) and True random number generators (TRNGs). The …
A survey on hardware implementations of elliptic curve cryptosystems
B Rashidi - arxiv preprint arxiv:1710.08336, 2017 - arxiv.org
In the past two decades, Elliptic Curve Cryptography (ECC) have become increasingly
advanced. ECC, with much smaller key sizes, offers equivalent security when compared to …
advanced. ECC, with much smaller key sizes, offers equivalent security when compared to …
High performance HITA based Binary Edward Curve Crypto processor for FPGA platforms
In an embedded and resource-constrained environment, Elliptic Curve Cryptography (ECC)
has been noted as an efficient and suitable methodology for achieving information security …
has been noted as an efficient and suitable methodology for achieving information security …
An area-time efficient point-multiplication architecture for ECC over GF (2m) using polynomial basis
The modern age has seen an enormous progress in communications. Millions of devices
communicate over the web transmitting confidential information which sometimes is of …
communicate over the web transmitting confidential information which sometimes is of …
Reconfigurable hardware architecture for authenticated key agreement protocol over binary edwards curve
In this article, we present a high-performance hardware architecture for Elliptic curve based
(authenticated) key agreement protocol “Elliptic Curve Menezes, Qu and …
(authenticated) key agreement protocol “Elliptic Curve Menezes, Qu and …
Design and leakage assessment of side channel attack resistant binary edwards Elliptic Curve digital signature algorithm architectures
Abstract Considering that Elliptic Curve Digital Signature Algorithm (ECDSA)
implementations need to be efficient, flexible and Side Channel Attack (SCA) resistant, in …
implementations need to be efficient, flexible and Side Channel Attack (SCA) resistant, in …
Low area-time complexity point multiplication architecture for ECC over GF() using polynomial basis
In the present day, billions of devices communicate over the wireless networks. The massive
information transmitted over open ended, and unsecured Internet architecture results in …
information transmitted over open ended, and unsecured Internet architecture results in …
Efficient hardware implementations of point multiplication for binary Edwards curves
B Rashidi - International Journal of Circuit Theory and …, 2018 - Wiley Online Library
This paper presents efficient and fast hardware implementations of the complete point
multiplication on binary Edwards curves (BECs). The implementations are based on …
multiplication on binary Edwards curves (BECs). The implementations are based on …
A High Speed and Area Efficient Processor for Elliptic Curve Scalar Point Multiplication for GF()
Binary polynomial multipliers impact the overall performance and cost of elliptic curve
cryptography (ECC) systems. Multiplication algorithms with subquadratic computational …
cryptography (ECC) systems. Multiplication algorithms with subquadratic computational …