2010
DOI: 10.1049/iet-ifs.2009.0038
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and side-channel-aware implementations of elliptic curve cryptosystems over prime fields

Abstract: Elliptic curve cryptosystems (ECCs) are utilised as an alternative to traditional public-key cryptosystems, and are more suitable for resource-limited environments because of smaller parameter size. In this study, the authors carry out a thorough investigation of side-channel attack aware ECC implementations over finite fields of prime characteristic including the recently introduced Edwards formulation of elliptic curves. The Edwards formulation of elliptic curves is promising in performance with built-in res… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(3 citation statements)
references
References 47 publications
0
3
0
Order By: Relevance
“…Repetitive plans, for example, convey spare math (CSA) [1], [2], excess marked digits (RSDs) [3], or deposit number frameworks (RNSs) [4], [5], have been used in different outlines. Convey rationale or inserted computerized flag preparing (DSP) hinders inside field programmable entryway exhibits (FPGAs) are additionally used in a few outlines to address the convey spread issue " [6], [7].…”
Section: Introductionmentioning
confidence: 99%
“…Repetitive plans, for example, convey spare math (CSA) [1], [2], excess marked digits (RSDs) [3], or deposit number frameworks (RNSs) [4], [5], have been used in different outlines. Convey rationale or inserted computerized flag preparing (DSP) hinders inside field programmable entryway exhibits (FPGAs) are additionally used in a few outlines to address the convey spread issue " [6], [7].…”
Section: Introductionmentioning
confidence: 99%
“…Higher-radix Montgomery multiplier implementations have been reported in [12], [13], [14] (radix-4), [15], [16] (radix-8), [17], [18], [19] (radix-16), [20] (radix-32), [21] (radix-64), and [22] (radix-256). Higher-radix multipliers typically result in faster multiplications, but also require more area than radix-2 multipliers.…”
Section: Introductionmentioning
confidence: 99%
“…However, when dealing with actual hardware implementations of cryptosystems based on these curves, the literature only provides works that targeted digital design of custom processors [10]. Conversely, this research aims at discussing and analyzing implementations that targets standard low-resources processors for embedded systems.…”
Section: Introductionmentioning
confidence: 99%