Advances in Applied Mathematics
Solving sparse linear equations over finite fields
IEEE Transactions on Information Theory
Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Journal of Cryptology
A family of Jacobians suitable for discrete log cryptosystems
CRYPTO '88 Proceedings on Advances in cryptology
A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves
Mathematics of Computation
Constructive problems for irreducible polynomials over finite fields
Proceedings of the third Canadian workshop on Information theory and applications
A course in computational algebraic number theory
A course in computational algebraic number theory
Algebraic aspects of cryptography
Algebraic aspects of cryptography
A survey of fast exponentiation methods
Journal of Algorithms
On the discrete logarithm in the divisor class group of curves
Mathematics of Computation
Elliptic curves in cryptography
Elliptic curves in cryptography
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Irreducible trinomials over finite fields
Proceedings of the 2001 international symposium on Symbolic and algebraic computation
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Shift Register Sequences
Exponentiation in Finite Fields: Theory and Practice
AAECC-12 Proceedings of the 12th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
CM-Curves with Good Cryptographic Properties
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
An Improved Algorithm for Arithmetic on a Family of Elliptic Curves
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Efficient Algorithms for Elliptic Curve Cryptosystems
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Secure Hyperelliptic Cryptosystems and Their Performances
PKC '98 Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Selecting Cryptographic Key Sizes
PKC '00 Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Counting Points on Hyperelliptic Curves over Finite Fields
ANTS-IV Proceedings of the 4th International Symposium on Algorithmic Number Theory
Improving Group Law Algorithms for Jacobians of Hyperelliptic Curves
ANTS-IV Proceedings of the 4th International Symposium on Algorithmic Number Theory
Fast Multiplication on Elliptic Curves over GF(2m) without Precomputation
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Elliptic Curve Scalar Multiplier Design Using FPGAs
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
Genus Two Hyperelliptic Curve Coprocessor
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
An End-to-End Systems Approach to Elliptic Curve Cryptography
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Fast Key Exchange with Elliptic Curve Systems
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
On the performance of hyperelliptic cryptosystems
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
An algorithm for solving the discrete log problem on hyperelliptic curves
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
IEEE Transactions on Computers
On efficient implementation of FPGA-based hyperelliptic curve cryptosystems
Computers and Electrical Engineering
Intellectual Property Protection for Embedded Sensor Nodes
SAMOS '08 Proceedings of the 8th international workshop on Embedded Computer Systems: Architectures, Modeling, and Simulation
Key agreement for heterogeneous mobile ad-hoc groups
International Journal of Wireless and Mobile Computing
Efficient doubling on genus 3 curves over binary fields
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
Hardware/software co-design for hyperelliptic curve cryptography (HECC) on the 8051 µP
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
Hi-index | 0.00 |
It is widely recognized that data security will play a central role in future IT systems. Providing public-key cryptographic primitives, which are the core tools for security, is often difficult on embedded processor due to computational, memory, and power constraints. This contribution appears to be the first thorough comparison of two public-key families, namely elliptic curve (ECC) and hyperelliptic curve cryptosystems on a wide range of embedded processor types (ARM, ColdFire, PowerPC). We investigated the influence of the processor type, resources, and architecture regarding throughput. Further, we improved previously known HECC algorithms resulting in a more efficient arithmetic.