High-speed hardware architecture of scalar multiplication for binary elliptic curve cryptosystems

B Rashidi, SM Sayedi, RR Farashahi - Microelectronics journal, 2016 - Elsevier
In this paper a hardware architecture of scalar multiplication based on Montgomery ladder
algorithm for binary elliptic curve cryptography is presented. In the proposed architecture …

A new approach of elliptic curve Diffie-Hellman key exchange

N Mehibel, MH Hamadouche - 2017 5th International …, 2017 - ieeexplore.ieee.org
Elliptic Curve Cryptosystem (ECC) schemes are public-key mechanisms that provide
encryption, digital signature and key exchange capabilities. The advantage of elliptic curves …

Study of different cryptographic technique and challenges in future

A Bhardwaj, S Som - … on Innovation and Challenges in Cyber …, 2016 - ieeexplore.ieee.org
In the recent years the need of security has increased many folds. It's not that the need to
secure data is new and goes back to the time of 1st and 2nd world war and even back to the …

A new algorithm for a public key cryptosystem using elliptic curve

N Mehibel, M Hamadouche - 2017 European Conference on …, 2017 - ieeexplore.ieee.org
Elliptic Curve Cryptography (ECC) is a public key cryptography, which is based on the
arithmetic of elliptic curves, and security of the hardness of the Discrete Logarithm Problem …

[PDF][PDF] A public key data encryption based on elliptic curves

N Mehibel, M Hamadouche - International Journal of Mathematical and …, 2017 - iaras.org
The basic Elliptic Curve Cryptosystem used for encryption is Elgamal encryption scheme, it
is a public key cryptosystem which is based on the difficulty of the Elliptic Curve Discrete …

A small-area implementation of cryptographic processor for 233-bit elliptic curves over binary field

BG Park, KW Shin - Journal of the Korea Institute of Information …, 2017 - koreascience.kr
This paper describes a design of cryptographic processor supporting 233-bit elliptic curves
over binary field defined by NIST. Scalar point multiplication that is core arithmetic in elliptic …

Correlation power analysis attack on lightweight block cipher lea and countermeasures by masking

HS An, KW Shin - Journal of the Korea Institute of Information and …, 2017 - koreascience.kr
Abstract Lightweight Encryption Algorithm (LEA) that was standardized as a lightweight
block cipher was implemented with 8-bit data path, and the vulnerability of LEA encryption …

경량블록암호LEA 에대한상관관계전력분석공격및마스킹대응기법.

안효식, 신경욱 - Journal of the Korea Institute of Information …, 2017 - search.ebscohost.com
요 약우리나라 경량 블록암호 표준인 LEA 알고리듬을 8-비트 데이터 패스의 하드웨어로
구현하고, 구현된 LEA-128 암호 프로세서에 대해 상관관계 전력분석 공격의 취약성을 …

233-비트이진체타원곡선을지원하는암호프로세서의저면적구현

박병관, 신경욱 - 한국정보통신학회논문지, 2017 - dbpia.co.kr
NIST 표준에 정의된 이진체 (binary field) 상의 233-비트 타원곡선을 지원하는 타원곡선 암호
(elliptic curve cryptography; ECC) 프로세서를 설계하였다. 타원곡선 암호 시스템의 핵심 …

[PDF][PDF] 233-bit ECC processor supporting NIST B-233 elliptic curve

BG Park, KW Shin - Proceedings of the Korean Institute of …, 2016 - koreascience.kr
전자서명 (ECDSA), 키 교환 (ECDH) 등에 사용되는 233-비트 타원곡선 암호 (Elliptic Curve
Cryptography; ECC) 프로세서의 설계에 대해 기술한다. $ GF (2^{333}) $ 상의 덧셈, 곱셈 …