A Review of Techniques for Implementing Elliptic Curve Point Multiplication on Hardware
暂无分享,去创建一个
Marko Beko | Valderi R. Q. Leithardt | Cesar Albenes Zeferino | Guilherme A. M. Sborz | Wemerson Parreira | Arielle Verri Lucca | V. Leithardt | M. Beko | C. Zeferino | W. Parreira
[1] T. Itoh,et al. A Fast Algorithm for Computing Multiplicative Inverses in GF(2^m) Using Normal Bases , 1988, Inf. Comput..
[2] J. Silverman. Advanced Topics in the Arithmetic of Elliptic Curves , 1994 .
[3] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[4] Sheetal Kalra,et al. Elliptic curve cryptography for real time embedded systems in IoT networks , 2016, 2016 5th International Conference on Wireless Networks and Embedded Systems (WECON).
[5] Chengqing Li,et al. When an attacker meets a cipher-image in 2018: A Year in Review , 2019, J. Inf. Secur. Appl..
[6] Henk Corporaal,et al. Embedded System Design , 2006 .
[7] Ingrid Verbauwhede,et al. Implementation of binary edwards curves for very-constrained devices , 2010, ASAP 2010 - 21st IEEE International Conference on Application-specific Systems, Architectures and Processors.
[8] Marc Joye,et al. Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults , 2005, Des. Codes Cryptogr..
[9] Mohammed Benaissa,et al. Throughput/Area-efficient ECC Processor Using Montgomery Point Multiplication on FPGA , 2015, IEEE Transactions on Circuits and Systems II: Express Briefs.
[10] Patrick Schaumont,et al. State-of-the-art of secure ECC implementations: a survey on known side-channel attacks and countermeasures , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[11] Faisal,et al. Text Encryption in Android Chat Applications using Elliptical Curve Cryptography (ECC) , 2018 .
[12] Moath Jarrah,et al. FPGA Implementation of the ECC Over GF(2m) for Small Embedded Applications , 2019, ACM Trans. Embed. Comput. Syst..
[13] Yinan Kong,et al. Parallel point-multiplication architecture using combined group operations for high-speed cryptographic applications , 2017, PloS one.
[14] R.K. Pateriya,et al. Elliptic Curve Cryptography in Constrained Environments: A Review , 2011, 2011 International Conference on Communication Systems and Network Technologies.
[15] Bahram Rashidi,et al. High-speed hardware architecture of scalar multiplication for binary elliptic curve cryptosystems , 2016, Microelectron. J..
[16] Ronald C. Mullin,et al. Optimal normal bases in GF(pn) , 1989, Discret. Appl. Math..
[18] Emilia Käsper. Fast Elliptic Curve Cryptography in OpenSSL , 2011, Financial Cryptography Workshops.
[19] Vivek Kapoor,et al. Elliptic curve cryptography , 2008, UBIQ.
[20] FarashahiReza Rezaeian,et al. High-speed hardware architecture of scalar multiplication for binary elliptic curve cryptosystems , 2016 .
[21] Marc Joye,et al. Efficient Arithmetic on Hessian Curves , 2010, Public Key Cryptography.
[22] Marc Joye,et al. Binary Huff Curves , 2011, CT-RSA.
[23] Dhiraj K. Pradhan,et al. On the Design and Optimization of a Quantum Polynomial-Time Attack on Elliptic Curve Cryptography , 2007, TQC.
[24] Mohammed Benaissa,et al. High-Speed and Low-Latency ECC Processor Implementation Over GF( $2^{m})$ on FPGA , 2017, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[25] Divya Kiran,et al. Design of speed and power efficient multipliers using vedic mathematics with VLSI implementation , 2014, 2014 International Conference on Advances in Electronics Computers and Communications.
[26] Seok-Bum Ko,et al. Flexible elliptic curve cryptography coprocessor using scalable finite field arithmetic blocks on FPGAs , 2018, Microprocess. Microsystems.
[27] Turki F. Al-Somani,et al. High-Performance Generic-Point Parallel Scalar Multiplication , 2017 .
[28] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[29] Alfred Menezes,et al. Elliptic curve cryptosystems and their implementation , 1993, Journal of Cryptology.
[30] Zhe Li,et al. Speed-Oriented Architecture for Binary Field Point Multiplication on Elliptic Curves , 2019, IEEE Access.
[31] Shuguo Li,et al. High-Performance Pipelined Architecture of Point Multiplication on Koblitz Curves , 2018, IEEE Transactions on Circuits and Systems II: Express Briefs.
[32] Motilal Singh Khoirom,et al. Cryptanalysis of multimedia encryption using elliptic curve cryptography , 2018, Optik.
[33] Raziyeh Salarifard,et al. A Low-Latency and Low-Complexity Point-Multiplication in ECC , 2018, IEEE Transactions on Circuits and Systems I: Regular Papers.
[34] N. P. Kumar,et al. An area-efficient ECC architecture over GF(2m) for resource-constrained applications , 2020 .
[35] San C. Vo. A Survey of Elliptic Curve Cryptosystems, Part I: Introductory , 2003 .
[36] Zilong Liu,et al. An Efficient and Flexible Hardware Implementation of the Dual-Field Elliptic Curve Cryptographic Processor , 2017, IEEE Transactions on Industrial Electronics.
[37] Gaurav Kumar Tak,et al. Secure Medical Data Transmission by Using ECC with Mutual Authentication in WSNs , 2015 .
[38] B. K. Kipkirui. Elliptic Curve Digital Signatures and Their Application in the Bitcoin Crypto-currency Transactions , 2017 .
[39] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[40] Reza Azarderakhsh,et al. Parallel and High-Speed Computations of Elliptic Curve Cryptography Using Hybrid-Double Multipliers , 2015, IEEE Transactions on Parallel and Distributed Systems.
[42] Muhammad Najam-ul-Islam,et al. ACryp-Proc: Flexible Asymmetric Crypto Processor for Point Multiplication , 2018, IEEE Access.
[43] J. Pollard. A monte carlo method for factorization , 1975 .
[44] Najlae Falah Hameed Al Saffar,et al. Improved arithmetic on elliptic curves over prime field , 2014 .