Open AccessJournal Article
A high-performance reconfigurable elliptic curve processor for GF(2m)
Gerardo Orlando,Christof Paar +1 more
TLDR
In this article, a processor architecture for elliptic curves cryptosystems over fields GF(2 m ) is proposed, which is a scalable architecture in terms of area and speed that exploits the abilities of reconfigurable hardware to deliver optimized circuitry for different elliptic curve and finite fields.Abstract:
This work proposes a processor architecture for elliptic curves cryptosystems over fields GF(2 m ) This is a scalable architecture in terms of area and speed that exploits the abilities of reconfigurable hardware to deliver optimized circuitry for different elliptic curves and finite fields The main features of this architecture are the use of an optimized bit-parallel squarer, a digit-serial multiplier, and two programmable processors Through reconfiguration, the squarer and the multiplier architectures can be optimized for any field order or field polynomial The multiplier performance can also be scaled according to system's needs Our results show that implementations of this architecture executing the projective coordinates version of the Montgomery scalar multiplication algorithm can compute elliptic curve scalar multiplications with arbitrary points in 021 msec in the field GF(2 167 ) A result that is at least 19 times faster than documented hardware implementations and at least 37 times faster than documented software implementationsread more
Citations
More filters
Book
Guide to Elliptic Curve Cryptography
TL;DR: This guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment, as well as side-channel attacks and countermeasures.
Journal ArticleDOI
Elliptic curve cryptography
TL;DR: The Elliptic Curve Cryptography algorithm and its suitability for smart cards is described and it is shown that the algorithm is suitable for smart card security.
Journal ArticleDOI
A scalable dual-field elliptic curve cryptographic processor
Akashi Satoh,K. Takano +1 more
TL;DR: An elliptic curve (EC) cryptographic processor architecture that can support Galois fields GF(p) and GF(2/sup n/) for arbitrary prime numbers and irreducible polynomials is proposed by introducing a dual field multiplier.
Proceedings ArticleDOI
Physical Unclonable Functions and Public-Key Crypto for FPGA IP Protection
TL;DR: New protocols for the IP protection problem on FPGAs based on public-key (PK) cryptography are proposed, the advantages and costs of such an approach are analyzed, and a PUF intrinsic to current FPG as based on SRAM properties is described.
Book ChapterDOI
An End-to-End Systems Approach to Elliptic Curve Cryptography
Nils Gura,Sheueling Chang Shantz,Hans Eberle,Sunil Gupta,Vishal Gupta,Daniel Finchelstein,Edouard Goupy,Douglas Stebila +7 more
TL;DR: A programmable hardware accelerator to speed up point multiplication for elliptic curves over binary polynomial fields GF(2m) and delivers optimized performance for a set of commonly used curves through hard-wired reduction logic.
References
More filters
Book
Guide to Elliptic Curve Cryptography
TL;DR: This guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment, as well as side-channel attacks and countermeasures.
Journal ArticleDOI
The Elliptic Curve Digital Signature Algorithm (ECDSA)
TL;DR: The ANSI X9.62 ECDSA is described and related security, implementation, and interoperability issues are discussed, and the strength-per-key-bit is substantially greater in an algorithm that uses elliptic curves.
MonographDOI
Introduction to finite fields and their applications
Rudolf Lidl,Harald Niederreiter +1 more
TL;DR: An introduction to the theory of finite fields, with emphasis on those aspects that are relevant for applications, especially information theory, algebraic coding theory and cryptology and a chapter on applications within mathematics, such as finite geometries.
Book
Elliptic Curves in Cryptography
TL;DR: In the past few years elliptic curve cryptography has moved from a fringe activity to a major challenger to the dominant RSA/DSA systems as mentioned in this paper, and it has become all pervasive.
Journal ArticleDOI
A fast algorithm for computing multiplicative inverses in GF(2 m ) using normal bases
Toshiya Itoh,Shigeo Tsujii +1 more
TL;DR: The fast algorithm proposed in this paper also uses normal bases, and computes multiplicative inverses iterating multiplications in GF(2 m ).
Related Papers (5)
A High Performance Reconfigurable Elliptic Curve Processor for GF(2m)
Gerardo Orlando,Christof Paar +1 more
A Scalable GF(p) Elliptic Curve Processor Architecture for Programmable Hardware
Gerardo Orlando,Christof Paar +1 more