Fast strategies for the implementation of SIKE round 3 on ARM Cortex-M4

M Anastasova, R Azarderakhsh… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The Supersingular Isogeny Key Encapsulation mechanism (SIKE) is the only post-quantum
key encapsulation protocol based on elliptic curves and isogeny maps between them …

A semantic-based methodology for digital forensics analysis

F Amato, A Castiglione, G Cozzolino… - Journal of Parallel and …, 2020 - Elsevier
Nowadays, more than ever, digital forensics activities are involved in any criminal, civil or
military investigation and represent a fundamental tool to support cyber-security …

Curve25519 for the Cortex-M4 and beyond

H Fujii, DF Aranha - Progress in Cryptology–LATINCRYPT 2017: 5th …, 2019 - Springer
We present techniques for the implementation of a key exchange protocol and digital
signature scheme based on the Curve25519 elliptic curve and its Edwards form …

Time-optimal design of finite field arithmetic for sike on cortex-m4

M Anastasova, R Azarderakhsh… - … Conference on Information …, 2022 - Springer
The advances in quantum technologies and the fast move toward quantum computing are
threatening classical cryptography and urge the deployment of post-quantum (PQ) schemes …

Four on embedded devices with strong countermeasures against side-channel attacks

Z Liu, P Longa, GCCF Pereira, O Reparaz… - … Hardware and Embedded …, 2017 - Springer
This work deals with the energy-efficient, high-speed and high-security implementation of
elliptic curve scalar multiplication and elliptic curve Diffie-Hellman (ECDH) key exchange on …

Memory-efficient implementation of elliptic curve cryptography for the Internet-of-Things

Z Liu, H Seo, A Castiglione… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In this paper, we present memory-efficient and scalable implementations of NIST
standardized elliptic curves P-256, P-384 and P-521 on three ARMv6-M processors (ie …

Lightweight implementations of NIST P-256 and SM2 ECC on 8-bit resource-constraint embedded device

L Zhou, C Su, Z Hu, S Lee, H Seo - ACM Transactions on Embedded …, 2019 - dl.acm.org
Elliptic Curve Cryptography (ECC) now is one of the most important approach to instantiate
asymmetric encryption and signature schemes, which has been extensively exploited to …

Efficient arithmetic on ARM‐NEON and its application for high‐speed RSA implementation

H Seo, Z Liu, J Großschädl… - Security and …, 2016 - Wiley Online Library
Advanced modern processors support single instruction, multiple data instructions (eg, Intel‐
AVX and ARM‐NEON) and a massive body of research on vector‐parallel implementations …

Four on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks

Z Liu, P Longa, GCCF Pereira… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
This work deals with the energy-efficient, high-speed and high-security implementation of
elliptic curve scalar multiplication, elliptic curve Diffie-Hellman (ECDH) key exchange and …

Efficient elliptic curve cryptography for embedded devices

Z Liu, J Weng, Z Hu, H Seo - ACM Transactions on Embedded …, 2016 - dl.acm.org
Many resource-constrained embedded devices, such as wireless sensor nodes, require
public key encryption or a digital signature, which has induced plenty of research on efficient …