Genetic programming (videotape): the movie
Genetic programming (videotape): the movie
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
A Survey of Hardware Implementation of RSA (Abstract)
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Power Analysis Attacks of Modular Exponentiation in Smartcards
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Montgomery Modular Exponentiation on Reconfigurable Hardware
ARITH '99 Proceedings of the 14th IEEE Symposium on Computer Arithmetic
DSD '02 Proceedings of the Euromicro Symposium on Digital Systems Design
Two Hardware Implementations for the Montgomery Modular Multiplication: Sequential versus Parallel
Proceedings of the 15th symposium on Integrated circuits and systems design
New Trends in Cryptographic Systems
New Trends in Cryptographic Systems
An overview of evolutionary algorithms in multiobjective optimization
Evolutionary Computation
Genetic Systems Programming: Theory and Experiences
Genetic Systems Programming: Theory and Experiences
Hi-index | 0.00 |
In this paper, we evolve digital circuits for public-key cryptosystems. The methodology used is based on genetic programming. The evolutionary process attempts to minimise the hardware area required to implement modular multiplication and exponentiation. It does so while it also attempts to optimise the encryption and decryption time, by considering multiple objectives. We show that the evolved designs are shielded against side-channel leakage. We compare our results against existing and well-known designs, which were produced by human designers.