2006 IEEE International Conference on Acoustics Speed and Signal Processing Proceedings
DOI: 10.1109/icassp.2006.1660801
|View full text |Cite
|
Sign up to set email alerts
|

A Parallel Processing Hardware Architecture for Elliptic Curve Cryptosystems

Abstract: We propose a parallel processing crypto-processor for Elliptic Curve Cryptography (ECC) to speed up EC point multiplication. The processor consists of a controller that dynamically checks instruction-level parallelism (ILP) and multiple sets of modular arithmetic logic units accelerating modular operations. A case study of HW design with the proposed architecture shows that EC point multiplication over GF(p) and GF(2 m ) can be improved by a factor of 1.6 compared to the case of using single processing element. Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(21 citation statements)
references
References 16 publications
(12 reference statements)
0
21
0
Order By: Relevance
“…The implementation from [20] is quite fast because of the use of fixed-base comb method. Compared to the state-of-the-art hardware implementations [21,22], software implementations are still slower. However, coprocessors add area and complexity to the whole system, and have far less flexibility than software implementations.…”
Section: Resultsmentioning
confidence: 98%
“…The implementation from [20] is quite fast because of the use of fixed-base comb method. Compared to the state-of-the-art hardware implementations [21,22], software implementations are still slower. However, coprocessors add area and complexity to the whole system, and have far less flexibility than software implementations.…”
Section: Resultsmentioning
confidence: 98%
“…Higher-radix Montgomery multiplier implementations have been reported in [12], [13], [14] (radix-4), [15], [16] (radix-8), [17], [18], [19] (radix-16), [20] (radix-32), [21] (radix-64), and [22] (radix-256). Higher-radix multipliers typically result in faster multiplications, but also require more area than radix-2 multipliers.…”
Section: Introductionmentioning
confidence: 98%
“…Most of them perform scalar multiplication on Weierstrass curves and target various FPGA platforms. Typical examples-that have a similar security level as Curve25519-are given in [1,14,15,25,26,28,30,35].…”
Section: Introductionmentioning
confidence: 99%