2011
DOI: 10.1016/j.vlsi.2011.04.001
|View full text |Cite
|
Sign up to set email alerts
|

Design and design methods for unified multiplier and inverter and its application for HECC

Abstract: a b s t r a c tThis paper describes two novel architectures for a unified multiplier and inverter (UMI) in GF(2 m ): the UMI merges multiplier and inverter into one unified data-path. As such, the area of the data-path is reduced. We present two options for hyperelliptic curve cryptography (HECC) using UMIs: an FPGAbased high-performance implementation (Type-I) and an ASIC-based lightweight implementation (Type-II). The use of a UMI combined with affine coordinates brings a smaller data-path, smaller memory an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 34 publications
0
3
0
Order By: Relevance
“…Hence, both PM and PA are performed in every iteration. Therefore, Algorithm 2 is secure in resistant timing attacks and simple power analysis attacks due to the independence between the operation and the value of scalar k. Meanwhile, we optimize the modular inversion and modular multiplication algorithms to make the operation time constant to resist timing attacks [32]. Overall, Algorithm 2 makes the proposed ECC processor resistant against simple sidechannel attacks (while other types of side-channel attacks are beyond the scope of this paper).…”
Section: Proposed Ld Montgomery Algorithmmentioning
confidence: 99%
“…Hence, both PM and PA are performed in every iteration. Therefore, Algorithm 2 is secure in resistant timing attacks and simple power analysis attacks due to the independence between the operation and the value of scalar k. Meanwhile, we optimize the modular inversion and modular multiplication algorithms to make the operation time constant to resist timing attacks [32]. Overall, Algorithm 2 makes the proposed ECC processor resistant against simple sidechannel attacks (while other types of side-channel attacks are beyond the scope of this paper).…”
Section: Proposed Ld Montgomery Algorithmmentioning
confidence: 99%
“…Therefore, there are many algorithms are presented in the literature to perform field division with their high performance realization in both software and hardware. These algorithms can be computed based on several schemes such as Fermat's little theorem [1,2], Extended Euclid's algorithm (EEA) [3,4,5,6,7], and Extended Stein's algorithm (ESA) [8,9,10,11,12].…”
Section: Introductionmentioning
confidence: 99%
“…There are two hardware techniques used to implement the filed division algorithms. The first technique is the conventional technique that is based on Lookup tables and is efficient for VLSI implementation of field division algorithms over GF(2 m ) for small field size m [3,6]. When m gets larger, we can not easily use this technique in VLSI implementations due to the increasing overhead cost of area.…”
Section: Introductionmentioning
confidence: 99%