FPGA implementation of high-speed area-efficient processor for elliptic curve point multiplication over prime field
Develo** a high-speed elliptic curve cryptographic (ECC) processor that performs fast
point multiplication with low hardware utilization is a crucial demand in the fields of …
point multiplication with low hardware utilization is a crucial demand in the fields of …
Gemini: Elastic SNARKs for diverse environments
We introduce a new class of succinct arguments, that we call elastic. Elastic SNARKs allow
the prover to allocate different resources (such as memory and time) depending on the …
the prover to allocate different resources (such as memory and time) depending on the …
Pipezk: Accelerating zero-knowledge proof with a pipelined architecture
Zero-knowledge proof (ZKP) is a promising cryptographic protocol for both computation
integrity and privacy. It can be used in many privacy-preserving applications including …
integrity and privacy. It can be used in many privacy-preserving applications including …
EC-crypto: Highly efficient area-delay optimized elliptic curve cryptography processor
Elliptic Curve Cryptography (ECC) based security protocols require much shorter key space
which makes ECC the most suitable option for resource-limited devices as compared to the …
which makes ECC the most suitable option for resource-limited devices as compared to the …
Area-time efficient hardware implementation of modular multiplication for elliptic curve cryptography
In this paper, an area-time efficient hardware implementation of modular multiplication over
five National Institute of Standard and Technology (NIST)-recommended prime fields is …
five National Institute of Standard and Technology (NIST)-recommended prime fields is …
Design and implementation of high-performance ECC processor with unified point addition on twisted Edwards curve
With the swift evolution of wireless technologies, the demand for the Internet of Things (IoT)
security is rising immensely. Elliptic curve cryptography (ECC) provides an attractive solution …
security is rising immensely. Elliptic curve cryptography (ECC) provides an attractive solution …
GMC-crypto: Low latency implementation of ECC point multiplication for generic Montgomery curves over GF (p)
Abstract Elliptic Curve Cryptography (ECC) is the front-runner among available public key
cryptography (PKC) schemes due to its potential to offer higher security per key bit. All ECC …
cryptography (PKC) schemes due to its potential to offer higher security per key bit. All ECC …
ECSM: efficient FPGA implementation of elliptic curve scalar multiplication over generic prime field GF(p)
Elliptic curve scalar multiplication (ECSM) is the primitive operation that is also the main
computational hurdle in almost all protocols based on elliptic curve cryptography (ECC) …
computational hurdle in almost all protocols based on elliptic curve cryptography (ECC) …
Area‐time efficient point multiplication architecture on twisted Edwards curve over general prime field
Elliptic curve point multiplication is the main primitive required in almost all security schemes
using elliptic curve cryptography (ECC). It is the leading computationally intensive operation …
using elliptic curve cryptography (ECC). It is the leading computationally intensive operation …
An efficient hardware implementation of the elliptic curve cryptographic processor over prime field
T Kudithi - International Journal of Circuit Theory and …, 2020 - Wiley Online Library
Elliptic curve cryptography (ECC) schemes are widely adopted for the digital signature
applications due to their key sizes, hardware resources, and higher security per bit than …
applications due to their key sizes, hardware resources, and higher security per bit than …