Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Montgomery Multiplication in GF(2^k
Designs, Codes and Cryptography
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Montgomery Multiplier and Squarer for a Class of Finite Fields
IEEE Transactions on Computers
A High-Speed Small RSA Encryption LSI with Low Power Dissipation
ISW '97 Proceedings of the First International Workshop on Information Security
Efficient Implementation of Elliptic Curve Cryptosystems on an ARM7 with Hardware Accelerator
ISC '01 Proceedings of the 4th International Conference on Information Security
Elliptic Curve Scalar Multiplier Design Using FPGAs
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
FPGA Implementation of a Microcoded Elliptic Curve Cryptographic Processor
FCCM '00 Proceedings of the 2000 IEEE Symposium on Field-Programmable Custom Computing Machines
Rapid Prototyping for Hardware Accelerated Elliptic Curve Public-Key Cryptosystems
RSP '01 Proceedings of the 12th International Workshop on Rapid System Prototyping
A Novel Unified Architecture for Public-Key Cryptography
Proceedings of the conference on Design, Automation and Test in Europe - Volume 3
On-demand design service innovations
IBM Journal of Research and Development
Relationship between GF(2^m) Montgomery and Shifted Polynomial Basis Multiplication Algorithms
IEEE Transactions on Computers
High-speed hardware implementations of Elliptic Curve Cryptography: A survey
Journal of Systems Architecture: the EUROMICRO Journal
An efficient polynomial multiplier in GF(2m) and its application to ECC designs
Proceedings of the conference on Design, automation and test in Europe
Flexible hardware reduction for elliptic curve cryptography in GF(2m)
Proceedings of the conference on Design, automation and test in Europe
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller
Computers and Electrical Engineering
IEEE Transactions on Computers
High-performance public-key cryptoprocessor for wireless mobile applications
Mobile Networks and Applications
A state-of-the-art elliptic curve cryptographic processor operating in the frequency domain
Mobile Networks and Applications
Scalable unified dual-radix architecture for montgomery multiplication in GF(P) and GF(2n)
Proceedings of the 2008 Asia and South Pacific Design Automation Conference
A GF(p) elliptic curve group operator resistant against side channel attacks
Proceedings of the 18th ACM Great Lakes symposium on VLSI
Public key cryptography empowered smart dust is affordable
International Journal of Sensor Networks
FPGA implementation of high performance elliptic curve cryptographic processor over GF(2163)
Journal of Systems Architecture: the EUROMICRO Journal
A unified architecture for a public key cryptographic coprocessor
Journal of Systems Architecture: the EUROMICRO Journal
How to Maximize the Potential of FPGA Resources for Modular Exponentiation
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
Ultra High Performance ECC over NIST Primes on Commercial FPGAs
CHES '08 Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems
FPGA implementations of elliptic curve cryptography and Tate pairing over a binary field
Journal of Systems Architecture: the EUROMICRO Journal
A versatile Montgomery multiplier architecture with characteristic three support
Computers and Electrical Engineering
Computers and Electrical Engineering
A multi-task-oriented security processing architecture with powerful extensibility
Proceedings of the 2009 Asia and South Pacific Design Automation Conference
On parallelization of high-speed processors for elliptic curve cryptography
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
WSEAS Transactions on Computers
Design and evaluation of hardware accelerator for elliptic curve cryptography point multiplication
CIS'09 Proceedings of the international conference on Computational and information science 2009
Designing an ASIP for Cryptographic Pairings over Barreto-Naehrig Curves
CHES '09 Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems
A highly efficient cipher processor for dual-field elliptic curve cryptography
IEEE Transactions on Circuits and Systems II: Express Briefs
An RNS implementation of an Fpelliptic curve point multiplier
IEEE Transactions on Circuits and Systems Part I: Regular Papers
Flexible hardware processor for elliptic curve cryptography over NIST prime fields
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Journal of Signal Processing Systems
A compact architecture for montgomery elliptic curve scalar multiplication processor
WISA'07 Proceedings of the 8th international conference on Information security applications
Efficient finite field processor for GF(2163) and its implementation
International Journal of High Performance Systems Architecture
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
A high speed coprocessor for elliptic curve scalar multiplications over Fp
CHES'10 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems
An ECDSA pocessor for RFID athentication
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
A high-performance unified-field reconfigurable cryptographic processor
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Full-custom VLSI design of a unified multiplier for elliptic curve cryptography on RFID tags
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
Customizable elliptic curve cryptosystems
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Prime field ECDSA signature processing for reconfigurable embedded systems
International Journal of Reconfigurable Computing - Special issue on selected papers from the international workshop on reconfigurable communication-centric systems on chips (ReCoSoC' 2010)
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
NOCS '11 Proceedings of the Fifth ACM/IEEE International Symposium on Networks-on-Chip
A cryptographic processor for low-resource devices: canning ECDSA and AES like sardines
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
Design and evaluation of parallel, scalable, curve based processor over binary field
WSEAS Transactions on Computers
Exploring the design space of prime field vs. binary field ECC-Hardware implementations
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
Controlling incoming connections using certificates and distributed hash tables
NEW2AN'07 Proceedings of the 7th international conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking
FPGA based unified architecture for public key and private key cryptosystems
Frontiers of Computer Science: Selected Publications from Chinese Universities
Hi-index | 14.99 |
We propose an elliptic curve (EC) cryptographic processor architecture that can support Galois fields {\rm GF}(p) and {\rm GF}(2^n) for arbitrary prime numbers and irreducible polynomials by introducing a dual field multiplier. A Montgomery multiplier with an optimized data bus and an on-the-fly redundant binary converter boost the throughput of the EC scalar multiplication. All popular cryptographic functions such as DSA, EC-DSA, RSA, CRT, and prime generation are also supported. All commands are organized in a hierarchical structure according to their complexity. Our processor has high scalability and flexibility between speed, hardware area, and operand size. In the hardware evaluation using a 0.13-\mum CMOS standard cell library, the high-speed design using 117.5 Kgates with a 64-bit multiplier achieved operation times of 1.21 ms and 0.19 ms for a 160-bit EC scalar multiplication in {\rm GF}(p) and {\rm GF}(2^n), respectively. A compact version with an 8-bit multiplier requires only 28.3K gates and executes the operations in 7.47 ms and 2.79 ms. Not only 160-bit operations, but any bit length can be supported by any hardware configuration so long as the memory capacity is sufficient.