GM De Dormale, JJ Quisquater - Journal of systems architecture, 2007 - Elsevier
For the last decade, Elliptic Curve Cryptography (ECC) has gained increasing acceptance in the industry and the academic community and has been the subject of several standards …
In this paper the benefits of implementation of the Tate pairing computation on dedicated hardware are discussed. The main observation lies in the fact that arithmetic architectures in …
R Granger, D Page, M Stam - IEEE Transactions on Computers, 2005 - ieeexplore.ieee.org
Although identity-based cryptography offers a number of functional advantages over conventional public key methods, the computational costs are significantly greater. The …
M Morales-Sandoval, LAR Flores… - Journal of …, 2021 - Wiley Online Library
The main topic of this paper is low‐cost public key cryptography in wireless sensor nodes. Security in embedded systems, for example, in sensor nodes based on field programmable …
The paper presents a survey of most common hardware architectures for finite field arithmetic especially suitable for cryptographic applications. We discuss architectures for …
JL Beuchat, M Shirase, T Takagi… - 18th IEEE Symposium …, 2007 - ieeexplore.ieee.org
In this paper, we propose a modified eta T pairing algorithm in characteristic three which does not need any cube root extraction. We also discuss its implementation on a low cost …
P Grabher, D Page - … Hardware and Embedded Systems–CHES 2005: 7th …, 2005 - Springer
Although identity based cryptography offers many functional advantages over conventional public key alternatives, the computational costs are significantly greater. The core …