Effects of instruction-set extensions on an embedded processor: a case study on elliptic curve cryptography over GF (2/sup m/)

S Bartolini, I Branovic, R Giorgi… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
Elliptic-Curve cryptography (ECC) is promising for enabling information security in
constrained embedded devices. In order to be efficient on a target architecture, ECCs …

A workload characterization of elliptic curve cryptography methods in embedded environments

I Branovic, R Giorgi, E Martinelli - ACM SIGARCH Computer Architecture …, 2003 - dl.acm.org
Elliptic Curve Cryptography (ECC) is emerging as an attractive public-key system for
constrained environments, because of the small key sizes and computational efficiency …

Architectural extensions for elliptic curve cryptography over gf (2/sup m/) on 8-bit microprocessors

H Eberle, A Wander, N Gura… - 2005 IEEE …, 2005 - ieeexplore.ieee.org
We describe and analyze architectural extensions to accelerate the public key cryptosystem
elliptic curve cryptography (ECC) on 8-bit microprocessors. We show that simple extensions …

Efficient elliptic curve cryptography for embedded devices

Z Liu, J Weng, Z Hu, H Seo - ACM Transactions on Embedded …, 2016 - dl.acm.org
Many resource-constrained embedded devices, such as wireless sensor nodes, require
public key encryption or a digital signature, which has induced plenty of research on efficient …

Review of elliptic curve cryptography processor designs

H Marzouqi, M Al-Qutayri, K Salah - Microprocessors and Microsystems, 2015 - Elsevier
Abstract Elliptic Curve Cryptography (ECC) is a multilayer system with increased hardware
implementation complexity. A wide range of parameters and design choices affect the …

A hardware processor supporting elliptic curve cryptography for less than 9 kGEs

E Wenger, M Hutter - International Conference on Smart Card Research …, 2011 - Springer
Abstract Elliptic Curve Cryptography (ECC) based processors have gained large attention in
the context of embedded-system design due to their ability of efficient implementation. In this …

8/16/32 shades of elliptic curve cryptography on embedded processors

E Wenger, T Unterluggauer, M Werner - Progress in Cryptology …, 2013 - Springer
The decision regarding the best suitable microprocessor for a given task is one of the most
challenging assignments a hardware designer has to face. In this paper, we make a …

A tightly coupled finite field arithmetic hardware in an FPGA-based embedded processor core for elliptic curve cryptography

M Khalil-Hani, A Irwansyah… - International Journal of …, 2009 - inderscienceonline.com
This work presents the implementation of a tightly-coupled hardware architectural
enhancement to the Altera FPGA-based Nios II embedded processor. The goal is to …

[PDF][PDF] Software Implementations of Elliptic Curve Cryptography.

ZJ Shi, H Yun - Int. J. Netw. Secur., 2008 - Citeseer
Abstract Elliptic Curve Cryptography (ECC) is a promising alternative for public-key
algorithms in resource-constrained systems because it provides a similar level of security …

Elliptic and hyperelliptic curves on embedded μP

T Wollinger, J Pelzl, V Wittelsberger, C Paar… - ACM Transactions on …, 2004 - dl.acm.org
It is widely recognized that data security will play a central role in future IT systems.
Providing public-key cryptographic primitives, which are the core tools for security, is often …