RR Farashahi, M Joye - International Workshop on Public Key …, 2010 - Springer
This paper considers a generalized form for Hessian curves. The family of generalized Hessian curves covers more isomorphism classes of elliptic curves. Over a finite field F_q, it …
R Azarderakhsh… - IEEE Transactions on Very …, 2011 - ieeexplore.ieee.org
Efficient implementation of point multiplication is crucial for elliptic curve cryptographic systems. This paper presents the implementation results of an elliptic curve crypto-processor …
K Jarvinen, J Skytta - IEEE Transactions on Very Large Scale …, 2008 - ieeexplore.ieee.org
This paper discusses parallelization of elliptic curve cryptography hardware accelerators using elliptic curves over binary fields F 2m. Elliptic curve point multiplication, which is the …
Recently, considerable research has been performed in cryptography and security to optimize the area, power, timing, and energy needed for the point multiplication operations …
In this work, we describe a software implementation of elliptic curve cryptography and pairing-based cryptography for the MSP430 microcontroller family, which is used in wireless …
T Oliveira, J López, DF Aranha… - Journal of Cryptographic …, 2014 - Springer
In this work, we present new arithmetic formulas for a projective version of the affine point representation (x, x+ y/x),(x, x+ y/x), for x ≠ 0, x≠ 0, which leads to an efficient computation …
In this paper, we introduce an FPGA-based processor for elliptic curve cryptography on Koblitz curves. The processor targets specifically to applications requiring very high speed …
D Hankerson, K Karabina… - IEEE Transactions on …, 2009 - ieeexplore.ieee.org
Galbraith, Lin, and Scott recently constructed efficiently computable endomorphisms for a large family of elliptic curves defined over IF q 2 and showed, in the case where q is a prime …