Filters








130 Hits in 8.7 sec

FPGA implementations of elliptic curve cryptography and Tate pairing over a binary field

Hao Li, Jian Huang, Philip Sweany, Dijiang Huang
2008 Journal of systems architecture  
Elliptic curve cryptography (ECC) is an alternative to traditional techniques for public key cryptography. It offers smaller key size without sacrificing security level.  ...  In this thesis, I propose the FPGA implementations of the elliptic curve point multiplication in GF (2 283 ) as well as Tate pairing computation on supersingular elliptic curve in GF (2 283 ).  ...  In this thesis, we study hardware implementation of elliptic curve point multiplication to speedup secure web transactions.  ... 
doi:10.1016/j.sysarc.2008.04.012 fatcat:3tlovro4lbfajgk3v2ffvheydu

High speed and Low space complexity FPGA based ECC processor

Rahila Bilal, M. Rajaram
2010 International Journal of Computer Applications  
FPGA based architecture for elliptic curve cryptography coprocessor ,which has promising performance in terms of both Space Complexity and Time Complexity is proposed in this paper.  ...  Elliptic Curve Cryptography is one of the most interested research topic in VLSI. Network security is becoming more and more crucial as the volume of data being exchanged on the Internet increases.  ...  The computationally intensive operation needed for ECC which is implemented in hardware using FPGA technology has numerous advantages. 2.ECC Elliptic curve cryptography is one of the public key cryptography  ... 
doi:10.5120/1195-1673 fatcat:2ueop6xnmvgpnbonsauelugtam

An End-to-End Systems Approach to Elliptic Curve Cryptography [chapter]

Nils Gura, Sheueling Chang Shantz, Hans Eberle, Sumit Gupta, Vipul Gupta, Daniel Finchelstein, Edouard Goupy, Douglas Stebila
2003 Lecture Notes in Computer Science  
We have integrated ECC into OpenSSL, today's dominant implementation of the secure Internet protocol SSL, and tested it with the Apache web server and open-source web browsers.  ...  A prototype implementation running in a Xilinx XCV2000E FPGA at 66.4 MHz shows a performance of 6987 point multiplications per second for GF (2 163 ).  ...  We would like to thank Jo Ebergen for suggesting to implement the divider with counters rather than with comparators and Marc Herbert for his help with the Solaris driver.  ... 
doi:10.1007/3-540-36400-5_26 fatcat:oy6iadywlbat7gml5jtd6cmzzm

Design of Elliptic Curve Crypto Processor with Modified Karatsuba Multiplier and its Performance Analysis

Suryawanshi Y.A, Neha Trimbak Khadgi
2013 International Journal of Distributed and Parallel systems  
This work presents the design of high performance elliptic curve crypto processor(ECCP) for an elliptic curve over the finite field GF(2^233).  ...  The curve which we choose is the standard curve for the digital signature. The processor is synthesized for Xilinx FPGA.  ...  RELATED WORK Revisiting the Itoh-Tsujii Inversion Algorithm for FPGA Platforms [1] paper generates components of several cryptographic implementations such as elliptic curve cryptography.  ... 
doi:10.5121/ijdps.2013.4308 fatcat:xatenk4fmjarfhq6trwl22vs6m

Performance Analysis of Cloud-based Health Care Data Privacy System Using Hybrid Techniques

C. Sapna Kumari, C. N. Asha, U. Rajashekhar, K. Viswanath
2022 International Journal of Biology and Biomedical Engineering  
Security level depends on the size of a symmetric key which is employed for encryption and decryption using various cryptography systems management and in modern approaches like block and RF codes including  ...  Nowadays, providing data security is satisfactory, developments are extended for obtaining data among the transceivers.  ...  In this proposed work a sidechannel attack (SCA) against the elliptic curve processor on an FPGA platform is designed and implemented.  ... 
doi:10.46300/91011.2022.16.7 fatcat:klxggoxf6zc3zi72qvvoxpa2ba

Generic implementations of elliptic curve cryptography using partial reduction

Nils Gura, Hans Eberle, Sheueling Chang Shantz
2002 Proceedings of the 9th ACM conference on Computer and communications security - CCS '02  
Though not as high in performance as an implementation optimized for a specific curve, it offers an attractive solution to supporting infrequently used curves or curves not known at the time of the implementation  ...  Elliptic Curve Cryptography (ECC) is evolving as an attractive alternative to other public-key schemes such as RSA by offering the smallest key size and the highest strength per bit.  ...  We would also like to thank André Weimerskirch for reviewing our paper and for his suggestions regarding the formal representation of our ideas.  ... 
doi:10.1145/586123.586126 fatcat:zghmubsfujdbjmasqf2uoglo2a

Generic implementations of elliptic curve cryptography using partial reduction

Nils Gura, Hans Eberle, Sheueling Chang Shantz
2002 Proceedings of the 9th ACM conference on Computer and communications security - CCS '02  
Though not as high in performance as an implementation optimized for a specific curve, it offers an attractive solution to supporting infrequently used curves or curves not known at the time of the implementation  ...  Elliptic Curve Cryptography (ECC) is evolving as an attractive alternative to other public-key schemes such as RSA by offering the smallest key size and the highest strength per bit.  ...  We would also like to thank André Weimerskirch for reviewing our paper and for his suggestions regarding the formal representation of our ideas.  ... 
doi:10.1145/586110.586126 dblp:conf/ccs/GuraES02 fatcat:h2cg6etnyrcyzf7yms42edvnuu

A Survey on Hardware Implementations of Elliptic Curve Cryptosystems [article]

Bahram Rashidi
2017 arXiv   pre-print
In the past two decades, Elliptic Curve Cryptography (ECC) have become increasingly advanced.  ...  ECC, with much smaller key sizes, offers equivalent security when compared to other asymmetric cryptosystems. In this survey, an comprehensive overview of hardware implementations of ECC is provided.  ...  elliptic curves over prime) and IPsec which are commonly used today in over-the-web transactions and secure document transfers.  ... 
arXiv:1710.08336v1 fatcat:g3gpz5lzgvc27fboa5tv4kdhze

Field Programmable Gate Array Applications—A Scientometric Review

Juan Ruiz-Rosero, Gustavo Ramirez-Gonzalez, Rahul Khanna
2019 Computation  
Also, we present an evolution and trend analysis of the related applications.  ...  Scientific publications related to FPGA started in 1992 and, up to now, we found more than 70,000 documents in the two leading scientific databases (Scopus and Clarivative Web of Science).  ...  Elliptic Curve Cryptography (ECC) is increasingly used in practice to instantiate public-key cryptography protocols, based on the algebraic structure of elliptic curves over finite fields [417].  ... 
doi:10.3390/computation7040063 fatcat:wxtatzsvvnfopghdfl25hcfc2a

Secure and Anonymous Voting D-App with IoT Embedded Device Using Blockchain Technology

Cristian Toma, Marius Popa, Catalin Boja, Cristian Ciurea, Mihai Doinea
2022 Electronics  
Implementation details are presented for the e-voting application, which was deployed inside of an IoT embedded device.  ...  The paper presents the construction of a proof-of-concept for a distributed and decentralized e-voting application in an IoT embedded device with the help of blockchain technology.  ...  Acknowledgments: This work was supported by Bucharest University of Economic Studies. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics11121895 fatcat:pamd3x4qbfbl5pb4k4dgqlemma

FPGA-based Digital Quantum Coprocessor

Valerii Hlukhov, Lviv Polytechnic National University, Computer Engineering Department, Bohdan Havano
2018 Advances in Cyber-Physical Systems  
in the session, they can only listen for the current session, and need to break the keys again in any future secure session.  ...  7 Quantum Safe Cryptography and Security 8 2 Overview What is cryptography and how is it used? Cryptography is literally the art of "secret writing".  ...  ECDH Elliptic Curve Diffie-Hellman.  ... 
doi:10.23939/acps2018.02.067 fatcat:7txboogyr5f5vgc5c5zzbovv34

Multi Level Key Exchange and Encryption Protocol for Internet of Things (IoT)

Poomagal C T, Sathish kumar G A, Deval Mehta
2020 Computer systems science and engineering  
This paper introduces a novel algorithm based on Elliptic Curve Cryptography(ECC) for multi-level Public Key Exchange and Encryption Mechanism.  ...  Over the past decade, the Internet of Things (IoT) has been a focus of study. Security and privacy are the most important problems for IoT applications and are still facing huge difficulties.  ...  ACKNOWLEDGMENTS This work was supported by Indian Space Research Organization(ISRO) under the RESPOND scheme of Projects with the grants No: ISRO/RES/3/750/17-18.  ... 
doi:10.32604/csse.2020.35.051 fatcat:aihmz7qujfavncbbuzx6fd3uii

Hardware Security in Emerging Technologies: Vulnerabilities, Attacks, and Solutions

Naghmeh Karimi, Kanad Basu, Chip-Hong Chang, Jason M. Fung
2021 IEEE Journal on Emerging and Selected Topics in Circuits and Systems  
She joined the University of Maryland, Baltimore County, as an Assistant Professor in 2017, where she leads the SECure, REliable, and Trusted Systems (SECRETS) Research Laboratory.  ...  She was a recipient of the National Science Foundation CAREER Award in 2020. She serves as an Associate Editor for the Journal of Electronic Testing: Theory and Applications (JETTA) (Springer).  ...  The sampling matrix serving as the cryptographic key for data encryption is exchanged using an elliptic-curve cryptography (ECC)-based key exchange protocol.  ... 
doi:10.1109/jetcas.2021.3084498 fatcat:asdqf3hf5rhtffa6gsmu7xu4yi

A Survey of Digital Signing in the Post Quantum Era [article]

Teik Guan Tan, Jianying Zhou
2019 IACR Cryptology ePrint Archive  
Public key cryptography is threatened by the advent of quantum computers.  ...  Using the matrix, we identify improvements needed for all 14 applications to have a feasible post-quantum secure replacement digital signing algorithm.  ...  The algorithm used for signing transactions is ECDSA with the secp256k1 elliptic curve [74] .  ... 
dblp:journals/iacr/TanZ19 fatcat:dqdej2srfnbxbeabjcu5s7wm2i

Security-Enabled Near-Field Communication Tag With Flexible Architecture Supporting Asymmetric Cryptography

Thomas Plos, Michael Hutter, Martin Feldhofer, Maksimiljan Stiglic, Francesco Cavaliere
2013 IEEE Transactions on Very Large Scale Integration (vlsi) Systems  
As security features, it supports encryption and decryption using the Advanced Encryption Standard (AES-128), the generation of digital signatures using the Elliptic Curve Digital Signature Algorithm (  ...  This article presents the design and implementation of a complete Near-Field Communication (NFC) tag system that supports high-security features.  ...  ACKNOWLEDGMENT The authors would like to thank Johannes Wolkerstorfer, Manfred Aigner, Jörn-Marc Schmidt, and Nikolaus Ribic for their contributions within this project and for very fruitful discussions  ... 
doi:10.1109/tvlsi.2012.2227849 fatcat:sahsybcl4bdb3iztme5knjhv7a
« Previous Showing results 1 — 15 out of 130 results