Recent progress on the elliptic curve discrete logarithm problem

SD Galbraith, P Gaudry - Designs, Codes and Cryptography, 2016 - Springer
Recent progress on the elliptic curve discrete logarithm problem | Designs, Codes and
Cryptography Skip to main content SpringerLink Account Menu Find a journal Publish with us …

Flexible architectures for cryptographic algorithms—A systematic literature review

M Rashid, M Imran, AR Jafri… - Journal of Circuits …, 2019 - World Scientific
Symmetric and asymmetric cryptographic algorithms are used for a secure transmission of
data over an unsecured public channel. In order to use these algorithms in real-time …

Elliptic curve lightweight cryptography: A survey

CA Lara-Nino, A Diaz-Perez… - Ieee …, 2018 - ieeexplore.ieee.org
Since it was invented in 1986, elliptic curve cryptography (ECC) has been studied widely in
industry and academy from different perspectives. Some of these aspects include …

Lightweight elliptic curve cryptography accelerator for internet of things applications

CA Lara-Nino, A Diaz-Perez, M Morales-Sandoval - Ad Hoc Networks, 2020 - Elsevier
Authentication, encryption, signatures, and key agreements are public key cryptography
(PKC) services required in certain Internet of Things (IoT) applications (such as healthcare …

Huff's model for elliptic curves

M Joye, M Tibouchi, D Vergnaud - … , ANTS-IX, Nancy, France, July 19-23 …, 2010 - Springer
This paper revisits a model for elliptic curves over ℚ introduced by Huff in 1948 to study a
diophantine problem. Huff's model readily extends over fields of odd characteristic. Every …

Online template attacks

L Batina, Ł Chmielewski, L Papachristodoulou… - Journal of Cryptographic …, 2019 - Springer
Template attacks are a special kind of side-channel attacks that work in two stages. In a first
stage, the attacker builds up a database of template traces collected from a device which is …

Efficient arithmetic on Hessian curves

RR Farashahi, M Joye - International Workshop on Public Key …, 2010 - Springer
This paper considers a generalized form for Hessian curves. The family of generalized
Hessian curves covers more isomorphism classes of elliptic curves. Over a finite field F_q, it …

Efficient FPGA implementations of point multiplication on binary Edwards and generalized Hessian curves using Gaussian normal basis

R Azarderakhsh… - IEEE Transactions on Very …, 2011 - ieeexplore.ieee.org
Efficient implementation of point multiplication is crucial for elliptic curve cryptographic
systems. This paper presents the implementation results of an elliptic curve crypto-processor …

Architectural review of polynomial bases finite field multipliers over GF(2m)

M Imran, M Rashid - … Computing and Digital Systems (C-CODE …, 2017 - ieeexplore.ieee.org
In elliptic curve cryptography (ECC), hardware architectures of finite field (FF) multipliers are
frequently proposed for polynomial as well as for normal bases representations over GF (2 …

ACryp-Proc: Flexible asymmetric crypto processor for point multiplication

M Imran, M Rashid, AR Jafri, M Najam-ul-Islam - IEEE Access, 2018 - ieeexplore.ieee.org
Flexibility is one of the driving agents for 5G architecture development to incorporate
enhanced mobile broad band, machine type communication (MTC), and ultra-reliable MTC …