On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS
DOI: 10.1007/978-3-540-76843-2_46
|View full text |Cite
|
Sign up to set email alerts
|

Compiler Assisted Elliptic Curve Cryptography

Abstract: Abstract. Although cryptographic software implementation is often performed by expert programmers, the range of performance and security driven options, as well as more mundane software engineering issues, still make it a challenge. The use of domain specific language and compiler techniques to assist in description and optimisation of cryptographic software is an interesting research challenge. Our results, which focus on Elliptic Curve Cryptography (ECC), show that a suitable language allows description of E… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…Compiler support for an efficient and secure low-level implementation of cryptographic primitives resistant against software side-channels [33] and applications to elliptic curve cryptography [34] is provided by Cryptography Aware language and cOmpiler (CAO) [35].…”
Section: Related Workmentioning
confidence: 99%
“…Compiler support for an efficient and secure low-level implementation of cryptographic primitives resistant against software side-channels [33] and applications to elliptic curve cryptography [34] is provided by Cryptography Aware language and cOmpiler (CAO) [35].…”
Section: Related Workmentioning
confidence: 99%
“…Lastly, there have been several research efforts toward automatically generating cryptographic protocols and executable code. This compiler-like approach has been applied to cryptographic applications such as security protocols [40,45,46,57,63], optimizations to software implementations involving elliptic-curve cryptography [9] and bilinear-map functions [56], secure two-party computation [34,48,49], and zero-knowledge proofs [3, 5-7, 21, 30, 52]. …”
Section: Related Workmentioning
confidence: 99%
“…A specification language at the implementation level of cryptographic primitives is Cryptography Aware Language and Compiler (CAO) [36]. This framework provides compiler support for efficient and secure implementation of cryptographic primitives resistant against software side-channels [37] and applications to elliptic curve cryptography [38]. In future versions of our compiler we plan to automatically generate implementations of our generated protocols also in CAO.…”
Section: Introductionmentioning
confidence: 99%