I Branovic, R Giorgi, E Martinelli - ACM SIGARCH Computer Architecture …, 2003 - dl.acm.org
Elliptic Curve Cryptography (ECC) is emerging as an attractive public-key system for constrained environments, because of the small key sizes and computational efficiency …
H Eberle, A Wander, N Gura… - 2005 IEEE …, 2005 - ieeexplore.ieee.org
We describe and analyze architectural extensions to accelerate the public key cryptosystem elliptic curve cryptography (ECC) on 8-bit microprocessors. We show that simple extensions …
Z Liu, J Weng, Z Hu, H Seo - ACM Transactions on Embedded …, 2016 - dl.acm.org
Many resource-constrained embedded devices, such as wireless sensor nodes, require public key encryption or a digital signature, which has induced plenty of research on efficient …
Abstract Elliptic Curve Cryptography (ECC) is a multilayer system with increased hardware implementation complexity. A wide range of parameters and design choices affect the …
E Wenger, M Hutter - International Conference on Smart Card Research …, 2011 - Springer
Abstract Elliptic Curve Cryptography (ECC) based processors have gained large attention in the context of embedded-system design due to their ability of efficient implementation. In this …
The decision regarding the best suitable microprocessor for a given task is one of the most challenging assignments a hardware designer has to face. In this paper, we make a …
This work presents the implementation of a tightly-coupled hardware architectural enhancement to the Altera FPGA-based Nios II embedded processor. The goal is to …
ZJ Shi, H Yun - Int. J. Netw. Secur., 2008 - Citeseer
Abstract Elliptic Curve Cryptography (ECC) is a promising alternative for public-key algorithms in resource-constrained systems because it provides a similar level of security …
T Wollinger, J Pelzl, V Wittelsberger, C Paar… - ACM Transactions on …, 2004 - dl.acm.org
It is widely recognized that data security will play a central role in future IT systems. Providing public-key cryptographic primitives, which are the core tools for security, is often …