Sciweavers

24 search results - page 5 / 5
» Securing Elliptic Curve Point Multiplication against Side-Ch...
Sort
View
CTRSA
2004
Springer
114views Cryptology» more  CTRSA 2004»
13 years 11 months ago
Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems
This paper presents a scalable hardware implementation of both commonly used public key cryptosystems, RSA and Elliptic Curve Cryptosystem (ECC) on the same platform. The introduce...
Lejla Batina, Geeke Bruin-Muurling, Siddika Berna ...
CHES
2001
Springer
193views Cryptology» more  CHES 2001»
13 years 10 months ago
Preventing SPA/DPA in ECC Systems Using the Jacobi Form
Abstract. In this paper we show how using a representation of an elliptic curve as the intersection of two quadrics in P3 can provide a defence against Simple and Differental Powe...
Pierre-Yvan Liardet, Nigel P. Smart
WOWMOM
2005
ACM
165views Multimedia» more  WOWMOM 2005»
13 years 11 months ago
Hybrid Key Establishment for Multiphase Self-Organized Sensor Networks
Recent work on key establishment for sensor networks has shown that it is feasible to employ limited Elliptic Curve Cryptography in sensor networks through hybrid protocols. In th...
Panayiotis Kotzanikolaou, Emmanouil Magkos, Christ...
TC
2010
13 years 15 days ago
Faster Interleaved Modular Multiplication Based on Barrett and Montgomery Reduction Methods
This paper proposes two improved interleaved modular multiplication algorithms based on Barrett and Montgomery modular reduction. The algorithms are simple and especially suitable ...
Miroslav Knezevic, Frederik Vercauteren, Ingrid Ve...