Specification and design of embedded systems
Specification and design of embedded systems
Meta-ElGamal signature schemes
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Elliptic Curve Public Key Cryptosystems
Elliptic Curve Public Key Cryptosystems
Efficient Identity Based Signature Schemes Based on Pairings
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Use of Elliptic Curves in Cryptography
CRYPTO '85 Advances in Cryptology
An Identity-Based Signature from Gap Diffie-Hellman Groups
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Fast Multiplication on Elliptic Curves over GF(2m) without Precomputation
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Hi-index | 0.00 |
In recent years many hardware designs of elliptic curve cryptography have been developed, aiming to accelerate the scalar multiplication process, mainly those based on the Field programmable Gate Arrays (FPGA), the major issue concerned the ability of embedding this strategic and strong algorithm in a very few hardware, we propose a scalable word based crypto processor that performs modular multiplication based on modified Montgomery algorithm for finite field GF(P) and GF(2m). The general trend of the hardware implementation of elliptic curve cryptography is to increase throughput by designing a variety of algorithms for the KP operation, by optimizing the architectures of finite field basic operation, and by selecting the most appropriate coordinate system point addition and doubling leave few possibilities for parallelism when considering a single KP operation. It is however possible to explore the design space of an elliptic curve crypto processor sharing the field operators among the computation of some different kP operation. In this paper the obtained parallelism scheme has been evaluated referring to an effective VLSI technology.