Filters








1,208 Hits in 4.5 sec

Optimal Use of Montgomery Multiplication on Smart Cards [chapter]

Arnaud Boscher, Robert Naciri
2006 Lecture Notes in Computer Science  
Our approach essentially consists in modifying the representation of the key and the algorithm embedded in smart card in order to take advantage of the Montgomery multiplication properties.  ...  Montgomery multiplication is used to speed up modular multiplications involved in public-key cryptosystems. However, it requires conversion of parameters into N -residue representation.  ...  By definition of Ã, we obtain a correct CRT RSA signature. This CRT RSA implementation using Montgomery multiplication is optimized for smart cards.  ... 
doi:10.1007/11733447_18 fatcat:lsisedytwzgt3jlsrat4txxmfa

Towards Efficient FPGA Implementation of Elliptic Curve Crypto-Processor for Security in IoT and Embedded Devices

Shaimaa Abu Khadra, Salah Eldin S. E. Abdulrahman, Nabil A. Ismail
2020 Menoufia Journal of Electronic Engineering Research  
So, the objective is to implement the main operation of Point Multiplication (PM) 𝑄 = 𝑘𝑃 using FPGA.  ...  Also, a comparison between sequential and parallel hardware design of PM based on Montgomery ladder algorithm is provided.  ...  The security of an ATM is based on using smart cards which may be contact, contactless, and hybrid cards. The hybrid cards can operate in either contact or contactless mode.  ... 
doi:10.21608/mjeer.2020.103280 fatcat:geqy5bsvlvcinm6j2p4inkonoa

Cryptographic smart cards

D. Naccache, D. M'Raihi
1996 IEEE Micro  
Smart-cards have the tremendous advantage over their magnetic stripe ancestors of being able to execute cryptographic algorithms locally in their internal circuitry.  ...  Smart-cards also provide special-purpose microcontrollers with built-in, self-programmable memory. Together these features make the cost of a malevolent attack far greater than the benefits.  ...  Acknowledgements This article is the full version of an invited talk given by David Naccache at Eurocrypt 95. The authors adapted it from various manufacturer data sheets and an earlier work by V.  ... 
doi:10.1109/40.502402 fatcat:k3raq57llzgopji5ywt3gnqxhe

A high-performance elliptic curve cryptographic coprocessor with side channel analysis countermeasures for smart IC card

Xiaowei Han, Beibei Wang, Liji Wu, An Wang
2015 IEICE Electronics Express  
The proposed coprocessor outperforms other coprocessors in terms of the overall performance of area, power, speed and security, which is quite suitable for smart IC card.  ...  Using SMIC 0.13-µm CMOS technology, synthesis results show that our coprocessor can perform one 256-bit elliptic curve scalar multiplication over the prime field in 8.35 ms at 50 MHz with only 1.98 mW  ...  The proposed coprocessor can be used in smart IC card for the design of elliptic curve cryptographic algorithms.  ... 
doi:10.1587/elex.12.20150470 fatcat:2iic7hv3vzh3vg2zb2gcaw4nnq

A Platform-Based SoC Design of a 32-Bit Smart Card

Wonjong Kim, Seungchul Kim, Younghwan Bae, Sungik Jun, Youngsoo Park, Hanjin Cho
2003 ETRI Journal  
The SoC was implemented using 0.25 µm technology. To reduce the power consumption of the smart card SoC, we applied power optimization techniques, including clock gating.  ...  It has a Java Card OS to support multiple applications. We modeled smart card readers with a foreign language interface for efficient verification of the smart card SoC.  ...  The RSA processor can perform modular multiplication and modular exponentiation operations for 1024-bit data using the Montgomery algorithm.  ... 
doi:10.4218/etrij.03.0103.0026 fatcat:nkztxbq6wjfitnptzeyoaxg76i

Memory-Constrained Implementation of Lattice-based Encryption Scheme on the Standard Java Card Platform [article]

Ye Yuan, Kazuhide Fukushima, Junting Xiao, Shinsaku Kiyomoto, Tsuyoshi Takagi
2018 IACR Cryptology ePrint Archive  
We present the first implementation of a lattice-based encryption scheme on the standard Java Card platform by combining number theoretic transform and improved Montgomery modular multiplication.  ...  on smart cards achievable.  ...  Montgomery modular multiplication Implementation of multiplications on small devices, especially on Java Card, is a difficult task that not only due to its constrained memory, but also because of its limited  ... 
dblp:journals/iacr/YuanFXKT18 fatcat:ljuugcimara5pjv2hgfpidqohy

An efficient scalable and hybrid arithmetic unit for public key cryptographic applications

SuJung Yu, MoonGyung Kim, SeokWon Heo, JooSeok Song, YongSurk Lee
2007 IEICE Electronics Express  
The Scalable Word-based Montgomery Modular arithmetic unit (SWMM) can process RSA with modified Finely Integrated Operand Scanning (FIOS) Montgomery algorithm.  ...  In this paper, we propose an efficient scalable and flexible arithmetic unit which executes word-based multiplication and squaring for RSA arithmetic and addition, multiplication and inversion in GF(2  ...  In this paper, we propose the viability of variable key space sizes cryptography on 32-bit processor core for using smart card application.  ... 
doi:10.1587/elex.4.461 fatcat:bm354ud25rbqtgmnsquag7t4fy

Performance Issues of Selective Disclosure and Blinded Issuing Protocols on Java Card [chapter]

Hendrik Tews, Bart Jacobs
2009 Lecture Notes in Computer Science  
The poor performance comes from the fact that the cryptographic coprocessor on the Java card can only be employed in very limited ways.  ...  In this paper we report on the performance of the RSA variants of Brands protocols for zero-knowledge proof and restrictive blinded issuing [1] .  ...  Acknowledgements We are grateful to Wojciech Mostowski for his help and his insights on Java-Card programming.  ... 
doi:10.1007/978-3-642-03944-7_8 fatcat:yhvf6t7pyrc53h3eiy767xxd3u

Smart Card Crypto-Coprocessors for Public-Key Cryptography [chapter]

Helena Handschuh, Pascal Paillier
2000 Lecture Notes in Computer Science  
This paper intends to provide information about up-to-date performances of smart-card arithmetic coprocessors regarding major public-key cryptosystems and analyze the main tendences of this developing  ...  We also comment hardware limitations of current technologies and provide a technique for extending them by virtually doubling their capacities.  ...  smart card market.  ... 
doi:10.1007/10721064_35 fatcat:jh6obsxykbeivdm4rpadhv7cai

Power Analysis to ECC Using Differential Power Between Multiplication and Squaring [chapter]

Toru Akishita, Tsuyoshi Takagi
2006 Lecture Notes in Computer Science  
Power analysis is a serious attack to implementation of elliptic curve cryptosystems (ECC) on smart cards. For ECC, many power analysis attacks and countermeasures have been proposed.  ...  In this paper, we propose a novel power analysis attack using differential power between modular multiplication and modular squaring.  ...  Conclusion We presented detailed descriptions of the biased power consumption between Montgomery modular multiplication and Montgomery modular squaring.  ... 
doi:10.1007/11733447_11 fatcat:3mpu5s4yovfdpmbjth4opeer6e

Implementing an efficient elliptic curve cryptosystem over $GF(p)$ on a smart card

Yvonne Hitchcock, Edward Dawson, Andrew Clark, Paul Montague
2003 ANZIAM Journal  
Eccs are especially suited to smart cards because of the limited memory and computational power available on these devices.  ...  Elliptic curve cryptosystems (eccs) are becoming more popular because of the reduced number of key bits required in comparison to other cryptosystems (for example, a 160 bit ecc has roughly the same security  ...  Acknowledgement: this research is part of an arc spirt project (C10024103) undertaken jointly by Queensland University of Technology and Motorola.  ... 
doi:10.21914/anziamj.v44i0.686 fatcat:cq4wnfwf5vgdbe5lpe3lihj2bu

A Tutorial on Physical Security and Side-Channel Attacks [chapter]

François Koeune, François-Xavier Standaert
2005 Lecture Notes in Computer Science  
This paper aims at providing a tutorial on the subject, overviewing the main kinds of attacks and highlighting their underlying principles.  ...  A recent branch of cryptography focuses on the physical constraints that a real-life cryptographic device must face, and attempts to exploit these constraints (running time, power consumption, . . . )  ...  Schindler for useful comments.  ... 
doi:10.1007/11554578_3 fatcat:4zw63o6xs5hvjlll7mc3mvts4a

Secure Network Card [chapter]

Michael Montgomery, Asad Ali, Karen Lu
2004 IFIP International Federation for Information Processing  
constraints of a smart card.  ...  This implementation enables a smart card to establish secure TCP/IP connections using SSL/TLS protocols to any client or server on the Internet, using only standard networking protocols, and requiring  ...  Instead of supporting multiple cipher suites, the design focused on a single one, TLS_RSA_WITH_DES_CBC_SHA that was available on all mainstream browsers.  ... 
doi:10.1007/1-4020-8147-2_13 fatcat:chdcosw2cfdpdkzol7dxizcgqq

Efficient Modular Arithmetic for SIMD Devices [article]

Wilke Trei
2013 arXiv   pre-print
This new results allow building personal computers which can handle more than 3 billion modular multiplications per second for a 192 bit module at moderate costs using modern graphic cards.  ...  We further present a new record for modular multiplications per second on a single desktop computer as well as a new record for the ECM factoring algorithm.  ...  Furthermore from Toom-3 onwards there are more unused bits that may be used for further optimizations. This is one of the subjects of future work on this topic.  ... 
arXiv:1310.3809v1 fatcat:y2vx3fzfczeprdhy244khgbzvq

IMPLEMENTATION OF RSA KEY GENERATION BASED ON RNS USING VERILOG

VISHAK M, N. SHANKARAIAH
2012 International Journal of Communication Networks and Security  
RSA key generation is of great concern for implementation of RSA cryptosystem on embedded system due to its long processing latency.  ...  A rate of 3 pairs per second can be achieved for 1024-bit RSA key generation at the frequency of 100 MHz.  ...  INTRODUCTION Public key cryptography has gained extreme popularity in many applications such as smart cards, digital certificate and so on.  ... 
doi:10.47893/ijcns.2012.1043 fatcat:bto4vevezzgrpn7jazntb3nvha
« Previous Showing results 1 — 15 out of 1,208 results