ASAP 2010 - 21st IEEE International Conference on Application-Specific Systems, Architectures and Processors 2010
DOI: 10.1109/asap.2010.5541000
|View full text |Cite
|
Sign up to set email alerts
|

Elliptic Curve point multiplication on GPUs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 36 publications
(16 citation statements)
references
References 7 publications
0
16
0
Order By: Relevance
“…Our approach differs from the previous reports implementing ECC schemes on GPUs [5,3,53,2] in that we divide the elliptic curve arithmetic over multiple threads instead of dividing a single finite field operation over the available resources. The presented algorithms are based on methods originating in cryptographic side-channel analysis [31] and are designed for a parallel computer architecture with a 32-bit instruction set.…”
Section: Introductionmentioning
confidence: 62%
See 3 more Smart Citations
“…Our approach differs from the previous reports implementing ECC schemes on GPUs [5,3,53,2] in that we divide the elliptic curve arithmetic over multiple threads instead of dividing a single finite field operation over the available resources. The presented algorithms are based on methods originating in cryptographic side-channel analysis [31] and are designed for a parallel computer architecture with a 32-bit instruction set.…”
Section: Introductionmentioning
confidence: 62%
“…This is an order of magnitude faster, in term of response time, compared to the previous fastest low-latency implementation [2]. Figure 1 shows the latencies when varying the amount of threads, eight threads are scheduled to work on a single ECSM, for different block-sizes on the GTX 580.…”
Section: Resultsmentioning
confidence: 94%
See 2 more Smart Citations
“…Cryptologic applications of GPUs have been considered before: symmetric cryptography in [33,20,56,21,44,11,18], asymmetric cryptography in [39,54,22] for RSA and in [54,1,9] for ECC, and enhancing symmetric [8] and asymmetric [7,5,6,10] cryptanalysis.…”
Section: Introductionmentioning
confidence: 99%