A reconfiguration hierarchy for elliptic curve cryptography

Embedded cryptographic applications with tight security and performance constraints require domain specific processors or coprocessors. This paper describes the design model of an elliptic curve public key encryption processor and investigates the design automation requirements of such a processor.

[1]  David Harel,et al.  Statecharts: A Visual Formalism for Complex Systems , 1987, Sci. Comput. Program..

[2]  Christof Paar,et al.  An FPGA-based performance evaluation of the AES block cipher candidate algorithm finalists , 2001, IEEE Trans. Very Large Scale Integr. Syst..

[3]  Jan M. Rabaey Silicon Platforms for the Next Generation Wireless Systems - What Role Does Reconfigurable Hardware Play? , 2000, FPL.

[4]  K. Keutzer,et al.  System-level design: orthogonalization of concerns andplatform-based design , 2000, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..

[5]  Gérard Berry,et al.  The foundations of Esterel , 2000, Proof, Language, and Interaction.

[6]  Alfred Menezes,et al.  Elliptic curve public key cryptosystems , 1993, The Kluwer international series in engineering and computer science.

[7]  Bart Preneel,et al.  Elliptic Curve Public-Key Cryptosystems - An Introduction , 1997, State of the Art in Applied Cryptography.

[8]  Sean W. Smith,et al.  Building the IBM 4758 Secure Coprocessor , 2001, Computer.