scispace - formally typeset
Open AccessJournal Article

A high-performance reconfigurable elliptic curve processor for GF(2m)

TLDR
In this article, a processor architecture for elliptic curves cryptosystems over fields GF(2 m ) is proposed, which is a scalable architecture in terms of area and speed that exploits the abilities of reconfigurable hardware to deliver optimized circuitry for different elliptic curve and finite fields.
Abstract
This work proposes a processor architecture for elliptic curves cryptosystems over fields GF(2 m ) This is a scalable architecture in terms of area and speed that exploits the abilities of reconfigurable hardware to deliver optimized circuitry for different elliptic curves and finite fields The main features of this architecture are the use of an optimized bit-parallel squarer, a digit-serial multiplier, and two programmable processors Through reconfiguration, the squarer and the multiplier architectures can be optimized for any field order or field polynomial The multiplier performance can also be scaled according to system's needs Our results show that implementations of this architecture executing the projective coordinates version of the Montgomery scalar multiplication algorithm can compute elliptic curve scalar multiplications with arbitrary points in 021 msec in the field GF(2 167 ) A result that is at least 19 times faster than documented hardware implementations and at least 37 times faster than documented software implementations

read more

Content maybe subject to copyright    Report

Citations
More filters
Book

Guide to Elliptic Curve Cryptography

TL;DR: This guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment, as well as side-channel attacks and countermeasures.
Journal ArticleDOI

Elliptic curve cryptography

TL;DR: The Elliptic Curve Cryptography algorithm and its suitability for smart cards is described and it is shown that the algorithm is suitable for smart card security.
Journal ArticleDOI

A scalable dual-field elliptic curve cryptographic processor

TL;DR: An elliptic curve (EC) cryptographic processor architecture that can support Galois fields GF(p) and GF(2/sup n/) for arbitrary prime numbers and irreducible polynomials is proposed by introducing a dual field multiplier.
Proceedings ArticleDOI

Physical Unclonable Functions and Public-Key Crypto for FPGA IP Protection

TL;DR: New protocols for the IP protection problem on FPGAs based on public-key (PK) cryptography are proposed, the advantages and costs of such an approach are analyzed, and a PUF intrinsic to current FPG as based on SRAM properties is described.
Book ChapterDOI

An End-to-End Systems Approach to Elliptic Curve Cryptography

TL;DR: A programmable hardware accelerator to speed up point multiplication for elliptic curves over binary polynomial fields GF(2m) and delivers optimized performance for a set of commonly used curves through hard-wired reduction logic.
References
More filters
Book

Guide to Elliptic Curve Cryptography

TL;DR: This guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment, as well as side-channel attacks and countermeasures.
Journal ArticleDOI

The Elliptic Curve Digital Signature Algorithm (ECDSA)

TL;DR: The ANSI X9.62 ECDSA is described and related security, implementation, and interoperability issues are discussed, and the strength-per-key-bit is substantially greater in an algorithm that uses elliptic curves.
MonographDOI

Introduction to finite fields and their applications

TL;DR: An introduction to the theory of finite fields, with emphasis on those aspects that are relevant for applications, especially information theory, algebraic coding theory and cryptology and a chapter on applications within mathematics, such as finite geometries.
Book

Elliptic Curves in Cryptography

TL;DR: In the past few years elliptic curve cryptography has moved from a fringe activity to a major challenger to the dominant RSA/DSA systems as mentioned in this paper, and it has become all pervasive.
Journal ArticleDOI

A fast algorithm for computing multiplicative inverses in GF(2 m ) using normal bases

TL;DR: The fast algorithm proposed in this paper also uses normal bases, and computes multiplicative inverses iterating multiplications in GF(2 m ).
Related Papers (5)