Elliptic curve point multiplication (ECPM) is one of the most critical operations in elliptic curve cryptography. In this brief, a new hardware architecture for ECPM over GF (p) is …
As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using …
The need to ensure the longevity of Wireless Sensor Networks (WSNs) and secure their communication has spurred various researchers to come up with various WSN models …
Elliptic curve point multiplication is considered to be the most significant operation in all elliptic curve cryptography systems, as it forms the basis of the elliptic curve discrete …
MA Mehrabi, A Jolfaei - ACM Transactions on Internet Technology, 2022 - dl.acm.org
An important security requirement in automotive networks is to authenticate, sign, and verify thousands of short messages per second by each vehicle. This requirement mandates the …
BK Do-Nguyen, C Pham-Quoc, NT Tran… - IEEE …, 2023 - ieeexplore.ieee.org
With the rising data evolution, the demand for secured communications over networks is rising immensely. Elliptic Curve Cryptography (ECC) provides an attractive solution to fulfill …
S Ma, S Hu, Z Yang, X Wang, M Liu, J Hu - Electronics, 2021 - mdpi.com
The Residue Number System (RNS) is a non-weighted number system. Benefiting from its inherent parallelism, RNS has been widely studied and used in Digital Signal Processing …
In this paper, a road-map toward Fault (FA) and Power Analysis Attack (PA) resistance is proposed that combines the Edwards Curves innate PA resistance and a base point …
Existing RNS implementations of modular multiplication employ Montgomery's technique, especially in cryptography where consecutive multiplications of large integers are used for …