2020
DOI: 10.1007/978-3-030-55304-3_11
|View full text |Cite
|
Sign up to set email alerts
|

Parallel Implementation of SM2 Elliptic Curve Cryptography on Intel Processors with AVX2

Abstract: This paper presents an efficient and secure implementation of SM2, the Chinese elliptic curve cryptography standard that has been adopted by the International Organization of Standardization (ISO) as ISO/IEC 14888-3:2018. Our SM2 implementation uses Intel's Advanced Vector Extensions version 2.0 (AVX2), a family of three-operand SIMD instructions operating on vectors of 8, 16, 32, or 64-bit data elements in 256-bit registers, and is resistant against timing attacks. To exploit the parallel processing capabilit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 22 publications
0
1
0
Order By: Relevance
“…This paper will combine the existing public safety video surveillance system and the introduction of embedded communication technology in GB35114 [8] for Class A standard [9], using DMA to directly dispatch data from the network port to notify the MCU for bi-directional identity information authentication, thereby strengthening security in the authentication process. Its literature [10] and literature [11] introduce the performance of the State Secrets SM2 algorithm in asymmetric public key cryptographic algorithm, key strength and storage space, and other aspects have great advantages, which in practical application makes the frontend device with security features safely access to the public security video surveillance system, and enhance its stability and reliability.…”
Section: Introductionmentioning
confidence: 99%
“…This paper will combine the existing public safety video surveillance system and the introduction of embedded communication technology in GB35114 [8] for Class A standard [9], using DMA to directly dispatch data from the network port to notify the MCU for bi-directional identity information authentication, thereby strengthening security in the authentication process. Its literature [10] and literature [11] introduce the performance of the State Secrets SM2 algorithm in asymmetric public key cryptographic algorithm, key strength and storage space, and other aspects have great advantages, which in practical application makes the frontend device with security features safely access to the public security video surveillance system, and enhance its stability and reliability.…”
Section: Introductionmentioning
confidence: 99%