Filters








148 Hits in 3.9 sec

Smart Card Crypto-Coprocessors for Public-Key Cryptography [chapter]

Helena Handschuh, Pascal Paillier
2000 Lecture Notes in Computer Science  
This paper intends to provide information about up-to-date performances of smart-card arithmetic coprocessors regarding major public-key cryptosystems and analyze the main tendences of this developing  ...  We also comment hardware limitations of current technologies and provide a technique for extending them by virtually doubling their capacities.  ...  The Public-Key Battlefield The most widely used smart card chips with crypto-coprocessors are listed here.  ... 
doi:10.1007/10721064_35 fatcat:jh6obsxykbeivdm4rpadhv7cai

Elliptic Curve Cryptosystems on Smart Cards [chapter]

Elsayed Mohammed, A. Emarah, Kh. El-Shennawy
2002 IFIP Advances in Information and Communication Technology  
Elliptic Curve Cryptography (ECC) offers small key size and high security.  ...  This paper presents a new protocol for smart card implementation of elliptic curves explaining how ECC can not only significantly reduce the cost, but also accelerate the deployment of smart cards in new  ...  This holds true for platforms such as those using Pentium processors or, in the case of smart cards, those having a crypto coprocessor to accelerate modular arithmetic.  ... 
doi:10.1007/978-0-387-35586-3_25 fatcat:ofkfo7gfgrfzro652lkf36qbku

Implementation of fast RSA key generation on smart cards

Chenghuai Lu, Andre L. M. dos Santos, Francisco R. Pimentel
2002 Proceedings of the 2002 ACM symposium on Applied computing - SAC '02  
Therefore, smart cards that use cryptography have to provide encryption, deoryption, as well as key generation inside its security perimeter.  ...  Although smart cards are becoming used in an ima'easing number of applications, there is small litezature of the implementation issues for smart cards.  ...  Because of this, the high-end smart card microcontrolle~s are equipped with special hardware, called crypto-coprocessor [8] , which can accelerate the crypto computations for a class of public key cryptographic  ... 
doi:10.1145/508832.508837 fatcat:bftohwt7hngypb3zu6vsz2jyw4

Implementation of fast RSA key generation on smart cards

Chenghuai Lu, Andre L. M. dos Santos, Francisco R. Pimentel
2002 Proceedings of the 2002 ACM symposium on Applied computing - SAC '02  
Therefore, smart cards that use cryptography have to provide encryption, deoryption, as well as key generation inside its security perimeter.  ...  Although smart cards are becoming used in an ima'easing number of applications, there is small litezature of the implementation issues for smart cards.  ...  Because of this, the high-end smart card microcontrolle~s are equipped with special hardware, called crypto-coprocessor [8] , which can accelerate the crypto computations for a class of public key cryptographic  ... 
doi:10.1145/508791.508837 dblp:conf/sac/LuSP02 fatcat:eznkpv3eknc6rdade7k4hyljgu

How to Implement Cost-Effective and Secure Public Key Cryptosystems [chapter]

Pil Joong Lee, Eun Jeong Lee, Yong Duk Kim
1999 Lecture Notes in Computer Science  
The smart card has been suggested for personal security in public key cryptosystems.  ...  As the size of the keys in public key cryptosystems is increased, the design of crypto-controllers in smart cards becomes more complicated.  ...  In this paper, we propose a concept of "Secure Module (SM)" to design an efficient and secure public key cryptosystem without additional crypto-coprocessor.  ... 
doi:10.1007/3-540-48059-5_8 fatcat:sdxoflgzlrcuhpmkf5wv7nsup4

Architectures of flexible symmetric key crypto engines—a survey

Lilian Bossuet, Michael Grand, Lubos Gaspar, Viktor Fischer, Guy Gogniat
2013 ACM Computing Surveys  
The flexibility of reconfigurable crypto processors and crypto coprocessors has reached new levels with the emergence of dynamically reconfigurable hardware architectures and tools.  ...  In this article, we review published works on symmetric key crypto engines and present current trends and design challenges.  ...  Lattice-based cryptography, multivariable public key cryptography, and code-based cryptography are possible solutions to post-quantum cryptography.  ... 
doi:10.1145/2501654.2501655 fatcat:h5pccigb35hfvinkrpn7s75gl4

A tightly coupled finite field arithmetic hardware in an FPGA-based embedded processor core for elliptic curve cryptography

M. Khalil Hani, A. Irwansyah, Y.W. Hau
2009 International Journal of Information and Communication Technology  
50% faster than the coprocessor based hardware.  ...  The goal is to accelerate finite field arithmetic operations in the binary fields of F 2 163 and F 2 193 , for application in a high-performance embedded system implementing elliptic-curve cryptography  ...  This makes ECC ideal for resourceconstrained environments, such as in PDAs, cellular phones and smart cards.  ... 
doi:10.1504/ijict.2009.026430 fatcat:carwkghctvcffj34gh5a3wkzvy

A tightly coupled finite field arithmetic hardware in an FPGA-based embedded processor core for elliptic curve cryptography

Mohamed Khalil-Hani, Arif Irwansyah, Y.W. Hau
2008 2008 International Conference on Electronic Design  
50% faster than the coprocessor based hardware.  ...  The goal is to accelerate finite field arithmetic operations in the binary fields of F 2 163 and F 2 193 , for application in a high-performance embedded system implementing elliptic-curve cryptography  ...  This makes ECC ideal for resourceconstrained environments, such as in PDAs, cellular phones and smart cards.  ... 
doi:10.1109/iced.2008.4786692 fatcat:g4parykmfzg3dcrbvod4x34djq

A PC Cryptographic Coprocessor Based on TI Signal Processor and Smart Card System [chapter]

Milan Markovic, Zoran Savic, Željko Obrenovic, Aca Nikolic
2001 IFIP Advances in Information and Communication Technology  
A cryptographic token is in this case the combination of the coprocessor board functions and the smart card functionality.  ...  The similar idea is applied for the smart card data input. The interface to the smart card is realized in the I/0 controler and the smart card reader connected directly to the NST2000 board.  ... 
doi:10.1007/978-0-387-35413-2_32 fatcat:74gp6y2ntfgcxddorfy722fhwi

A Password-Authenticated Key Agreement Scheme Based on ECC Using Smart Cards

Aqeel Khalique, Kuldip Singh, Sandeep Sood
2010 International Journal of Computer Applications  
Elliptic Curve Cryptography (ECC) is one of the best public key techniques for its small key size and high security and is suitable for secure access of smart cards because implementation on smart cards  ...  And yet, our scheme is simpler and more efficient for smart card authentication.  ...  No Coprocessor Other public -key systems involve so much computation that a dedicated hardware device known as a crypto coprocessor is required.  ... 
doi:10.5120/647-903 fatcat:3qstmpioqngvvdo6mappy3dxwi

Page 401 of IEEE Transactions on Computers Vol. 52, Issue 4 [page]

2003 IEEE Transactions on Computers  
computer architectures for public-key cryptography.  ...  areas in which we sought papers; these were * ET TTT aR or secret-key and public-key cryptography, e reconfigurable computing and applications in cryptography, cryptographic processors and coprocessors  ... 

The IBM PCIXCC: A new cryptographic coprocessor for the IBM eServer

T. W. Arnold, L. P. Van Doorn
2004 IBM Journal of Research and Development  
These features are possible because of innovative design in both the hardware and embedded software for the card. This paper provides an overview of that design.  ...  This paper describes the PCIXCC, the new coprocessor introduced in the IBM z990 server. In many ways, PCIXCC is a watershed design.  ...  • Processing Europay**-MasterCard**-Visa** (EMV) smart-card-based transactions [17] . • They are used to define the length of the key and its position for multilength DES keys.  ... 
doi:10.1147/rd.483.0475 fatcat:5j64tgvjrfekthkazks22fcxnu

An Authentication Method for Secure Internet Transaction Using Smart Card and Secure Coprocessor

Mustafa A. Ayad, V. Prakash, N. K. Noordin, W. A. Wan Adnan
2003 Jurnal Teknologi  
Smart Cards, carrying digital signatures, private keys and certificates, offer an approach to trust in the security world that integrates the familiar card form with the capability to provide strong authentication  ...  In this paper, we propose new methods of authentication in systems that use Smart Cards and secure coprocessor to ensure secure Internet transactions and provide solutions on how to defend against some  ...  Keys used for authentication must be generated inside a coprocessor and the cryptographic smart card.  ... 
doi:10.11113/jt.v38.502 fatcat:xhkbf7iglngohgot2lm4cdbbim

Efficient and Secured Implementation of PostQuantum Cryptography

T. Pöppelmann
2020 Zenodo  
Moreover, we describe how existing cryptographic hardware on smart cards or embedded microcontrollers can be used to accelerate post-quantum cryptography.  ...  In this work, we show the challenges of implementing PQC on embedded devices and smart cards.  ...  A special class of constrained devices are smart cards or chip cards, which are used in electronic banking, for secured identification (e.g. passports or ID cards), authentication or transport and ticket  ... 
doi:10.5281/zenodo.3952199 fatcat:xossslfspzbydgn2mwzw7mcdca

Security and Performance Evaluation of ESIGN and RSA on IC Cards by Using Byte-Unit Modular Algorithms

C.-H. YANG
2005 IEICE transactions on communications  
This paper presents our implementation results of digital signature algorithms on IC cards by using byte-unit modular arithmetic algorithm method [13] , [20] .  ...  We evaluated the performance of wellknown ESIGN and RSA digital signature algorithms on the dedicated IC card chips and showed that ESIGN is more efficient than RSA.  ...  Acknowledgement The authors wish to thank anonymous reviewers for their valuable comments of the earlier manuscript of this paper. Their suggestions have greatly enhance the quality of this paper.  ... 
doi:10.1093/ietcom/e88-b.3.1244 fatcat:e45pjriktrgo5co4d422qshpk4
« Previous Showing results 1 — 15 out of 148 results