Sciweavers

49 search results - page 10 / 10
» Pipelined Computation of Scalar Multiplication in Elliptic C...
Sort
View
ICCD
2006
IEEE
132views Hardware» more  ICCD 2006»
14 years 3 months ago
FPGA-based Design of a Large Moduli Multiplier for Public Key Cryptographic Systems
— High secure cryptographic systems require large bit-length encryption keys which presents a challenge to their efficient hardware implementation especially in embedded devices...
Osama Al-Khaleel, Christos A. Papachristou, Franci...
WOWMOM
2005
ACM
165views Multimedia» more  WOWMOM 2005»
13 years 11 months ago
Hybrid Key Establishment for Multiphase Self-Organized Sensor Networks
Recent work on key establishment for sensor networks has shown that it is feasible to employ limited Elliptic Curve Cryptography in sensor networks through hybrid protocols. In th...
Panayiotis Kotzanikolaou, Emmanouil Magkos, Christ...
CHES
2004
Springer
99views Cryptology» more  CHES 2004»
13 years 11 months ago
Defeating Countermeasures Based on Randomized BSD Representations
Abstract. The recent development of side channel attacks has lead implementers to use increasingly sophisticated countermeasures in critical operations such as modular exponentiati...
Pierre-Alain Fouque, Frédéric Muller...
CHES
2008
Springer
134views Cryptology» more  CHES 2008»
13 years 8 months ago
Ultra High Performance ECC over NIST Primes on Commercial FPGAs
Elliptic Curve Cryptosystems (ECC) have gained increasing acceptance in practice due to their significantly smaller bit size of the operands compared to other public-key cryptosyst...
Tim Güneysu, Christof Paar