Hardware Accelerators for Elliptic Curve Cryptography
نویسندگان
چکیده
منابع مشابه
Hardware Accelerators for Elliptic Curve Cryptography
In this paper we explore different hardware accelerators for cryptography based on elliptic curves. Furthermore, we present a hierarchical multiprocessor system-onchip (MPSoC) platform that can be used for fast integration and evaluation of novel hardware accelerators. In respect of two application scenarios the hardware accelerators are coupled at different hierarchy levels of the MPSoC platfo...
متن کاملHardware Assisted Elliptic Curve Cryptography∗
The increased vulnerability of network attached computers has elevated the need for strong security methods. At the same time, advancements in the the area of cryptography have risen to meet this challenge. This report concerns one particular form of cryptography which uses the mathematics of elliptic curves. In particular, the suitability of enhancing current methods with specialized hardware ...
متن کاملA Hardware Accelerator for Elliptic Curve Cryptography
This paper describes a hardware accelerator for elliptic curve cryptography. The accelerator performs Galois field operations as a series of microcode instructions operating on 32-bit subsections of operands, which represent elements from GF(2) in a binary polynomial basis. The accelerator may be used for arbitrary size elliptic curves up to a field degree of 512. Parallelism between operations...
متن کاملCustomising Hardware Designs for Elliptic Curve Cryptography
This paper presents a method for producing hardware designs for Elliptic Curve Cryptography (ECC) systems over the finite field GF(2), using the optimal normal basis for the representation of numbers. A design generator has been developed which can automatically produce a customised ECC hardware design that meets user-defined requirements. This method enables designers to rapidly explore and im...
متن کاملHardware architecture for elliptic curve cryptography and lossless data compression
Data compression and cryptography play an important role when transmitting data across a public computer network. While compression reduces the amount of data to be transferred or stored, cryptography ensures that data is transmitted with reliability and integrity. Compression and encryption have to be applied in the correct way: data are compressed before they are encrypted. If it were the opp...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Advances in Radio Science
سال: 2008
ISSN: 1684-9973
DOI: 10.5194/ars-6-259-2008