Novel systolization of subquadratic space complexity multipliers based on toeplitz matrix–vector product approach
Systolic finite field multiplier over GF (2 m), because of its superior features such as high
throughput and regularity, is highly desirable for many demanding cryptosystems. On the …
throughput and regularity, is highly desirable for many demanding cryptosystems. On the …
High-Speed and Low-Latency ECC Processor Implementation Over GF( on FPGA
ZUA Khan, M Benaissa - IEEE transactions on very large scale …, 2016 - ieeexplore.ieee.org
In this paper, a novel high-speed elliptic curve cryptography (ECC) processor
implementation for point multiplication (PM) on field-programmable gate array (FPGA) is …
implementation for point multiplication (PM) on field-programmable gate array (FPGA) is …
Throughput/area-efficient ECC processor using Montgomery point multiplication on FPGA
M Benaissa - IEEE Transactions on Circuits and Systems II …, 2015 - ieeexplore.ieee.org
High throughput while maintaining low resource is a key issue for elliptic curve cryptography
(ECC) hardware implementations in many applications. In this brief, an ECC processor …
(ECC) hardware implementations in many applications. In this brief, an ECC processor …
[HTML][HTML] A survey of some recent bit-parallel GF (2n) multipliers
H Fan, MA Hasan - Finite Fields and Their Applications, 2015 - Elsevier
This paper surveys bit-parallel multipliers for finite field GF (2 n) according to i) quadratic and
subquadratic arithmetic complexities of the underlying algorithms, ii) various bases used for …
subquadratic arithmetic complexities of the underlying algorithms, ii) various bases used for …
Novel Architecture for Efficient FPGA Implementation of Elliptic Curve Cryptographic Processor Over
H Mahdizadeh, M Masoumi - IEEE transactions on very large …, 2013 - ieeexplore.ieee.org
A new and highly efficient architecture for elliptic curve scalar point multiplication is
presented. To achieve the maximum architectural and timing improvements, we reorganize …
presented. To achieve the maximum architectural and timing improvements, we reorganize …
Efficient FPGA implementations of point multiplication on binary Edwards and generalized Hessian curves using Gaussian normal basis
R Azarderakhsh… - IEEE Transactions on Very …, 2011 - ieeexplore.ieee.org
Efficient implementation of point multiplication is crucial for elliptic curve cryptographic
systems. This paper presents the implementation results of an elliptic curve crypto-processor …
systems. This paper presents the implementation results of an elliptic curve crypto-processor …
High-Performance Pipelined Architecture of Elliptic Curve Scalar Multiplication Over GF( )
L Li, S Li - IEEE Transactions on Very Large Scale Integration …, 2015 - ieeexplore.ieee.org
This paper proposes an efficient pipelined architecture of elliptic curve scalar multiplication
(ECSM) over GF (2 m). The architecture uses a bit-parallel finite field (FF) multiplier …
(ECSM) over GF (2 m). The architecture uses a bit-parallel finite field (FF) multiplier …
Innovative dual-binary-field architecture for point multiplication of elliptic curve cryptography
J Li, W Wang, J Zhang, Y Luo, S Ren - IEEE Access, 2021 - ieeexplore.ieee.org
High-performance Elliptic Curve Cryptography (ECC) implementation in encryption
authentication severs has become a challenge due to the explosive growth of e-commerce's …
authentication severs has become a challenge due to the explosive growth of e-commerce's …
Efficient algorithm and architecture for elliptic curve cryptography for extremely constrained secure applications
Recently, considerable research has been performed in cryptography and security to
optimize the area, power, timing, and energy needed for the point multiplication operations …
optimize the area, power, timing, and energy needed for the point multiplication operations …
Low-latency digit-serial and digit-parallel systolic multipliers for large binary extension fields
For cryptographic algorithms, such as elliptic curve digital signature algorithm (ECDSA) and
pairing algorithm, the crypto-processors are required to perform large number of additions …
pairing algorithm, the crypto-processors are required to perform large number of additions …