Elliptic Curve Protocols

An entire chapter is dedicated to elliptic curves since there is great hope that advances in this area will bring higher levels of security to many embedded devices. Compared to previous public key systems, elliptic curve cryptography (ECC) promises equivalent security strength with smaller key sizes. Since key size impacts storage and in general has been shown to impact performance and thus energy dissipation, these elliptic curves are of great interest to embedded systems. The notion of using elliptic curves in cryptography is generally agreed to have emerged from two famous papers: those of Miller (1986) and Koblitz (1987).

[1]  Marc Joye,et al.  Trading Inversions for Multiplications in Elliptic Curve Cryptography , 2006, Des. Codes Cryptogr..

[2]  Johannes Wolkerstorfer,et al.  Scaling ECC Hardware to a Minimum , 2005 .

[3]  Jens-Peter E Kaps,et al.  Cryptography for Ultra-Low Power Devices , 2006 .

[4]  Catherine H. Gebotys Design of secure cryptography against the threat of power-attacks in DSP-embedded processors , 2004, TECS.

[5]  Alfred Menezes,et al.  Software Implementation of the NIST Elliptic Curves Over Prime Fields , 2001, CT-RSA.

[6]  Tanja Lange,et al.  Handbook of Elliptic and Hyperelliptic Curve Cryptography , 2005 .

[7]  Jun Feng,et al.  Low-power hardware implementation of ECC processor suitable for low-cost RFID tags , 2008, 2008 9th International Conference on Solid-State and Integrated-Circuit Technology.

[8]  Laurent Imbert,et al.  Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains , 2005, ASIACRYPT.

[9]  Alfred Menezes,et al.  Software Implementation of Elliptic Curve Cryptography over Binary Fields , 2000, CHES.

[10]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[11]  Tim Güneysu,et al.  Ultra High Performance ECC over NIST Primes on Commercial FPGAs , 2008, CHES.

[12]  Bodo Möller Algorithms for Multi-exponentiation , 2001, Selected Areas in Cryptography.

[13]  Kimmo Järvinen,et al.  On Parallelization of High-Speed Processors for Elliptic Curve Cryptography , 2008, IEEE Trans. Very Large Scale Integr. Syst..

[14]  Laurent Imbert,et al.  Extended Double-Base Number System with Applications to Elliptic Curve Cryptography , 2006, INDOCRYPT.

[15]  Tanja Lange,et al.  Faster Addition and Doubling on Elliptic Curves , 2007, ASIACRYPT.

[16]  Kin Choong Yow,et al.  Efficient Implementation of Elliptic Curve Cryptography (ECC) for Personal Digital Assistants (PDAs) , 2004, Wirel. Pers. Commun..

[17]  Berk Sunar,et al.  Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.

[18]  Srivaths Ravi,et al.  Analyzing the energy consumption of security protocols , 2003, ISLPED '03.

[19]  Graham A. Jullien,et al.  Theory and applications for a double-base number system , 1997, Proceedings 13th IEEE Sympsoium on Computer Arithmetic.

[20]  Pradeep Kumar Mishra,et al.  Pipelined computation of scalar multiplication in elliptic curve cryptosystems (extended version) , 2006, IEEE Transactions on Computers.

[21]  Patrick Longa,et al.  Accelerating the Scalar Multiplication on Elliptic Curve Cryptosystems over Prime Fields , 2008, IACR Cryptol. ePrint Arch..

[22]  Atsuko Miyaji,et al.  Efficient Elliptic Curve Exponentiation Using Mixed Coordinates , 1998, ASIACRYPT.

[23]  H. Edwards A normal form for elliptic curves , 2007 .

[24]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[25]  Vivek Kapoor,et al.  Elliptic curve cryptography , 2008, UBIQ.

[26]  Christof Paar,et al.  Hyperelliptic Curve Coprocessors on a FPGA , 2004, WISA.

[27]  Chae Hoon Lim,et al.  Fast Implementation of Elliptic Curve Arithmetic in GF(pn) , 2000, Public Key Cryptography.

[28]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[29]  J. Pollard,et al.  Monte Carlo methods for index computation () , 1978 .

[30]  Ingrid Verbauwhede,et al.  Public-Key Cryptography on the Top of a Needle , 2007, 2007 IEEE International Symposium on Circuits and Systems.

[31]  Joseph H. Silverman,et al.  NTRU: A Ring-Based Public Key Cryptosystem , 1998, ANTS.

[32]  Christof Paar,et al.  Efficient Implementation of Elliptic Curve Cryptosystems on the TI MSP 430x33x Family of Microcontrollers , 2001, Public Key Cryptography.

[33]  Patrick Longa,et al.  Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication , 2009, IACR Cryptol. ePrint Arch..

[34]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[35]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[36]  Jerome A. Solinas,et al.  Efficient Arithmetic on Koblitz Curves , 2000, Des. Codes Cryptogr..