Hardware optimizations for crypto implementations

MMA Basiri, SK Shukla - … Symposium on VLSI Design and Test …, 2016 - ieeexplore.ieee.org
Latency, Area, and Power are three important metrics that a VLSI designer wants to
optimize. However, often one of these may have to be optimized at the cost of another or the …

All about encryption in smart card

M Savari, M Montazerolzohour - Proceedings Title: 2012 …, 2012 - ieeexplore.ieee.org
Smart cards are one of the efficient devices in providing security in some systems. Smart
cards are secured with using encryption algorithms. Finding the best algorithm in smart …

[PDF][PDF] Analysis and implementation of combined approach of RSA and ECC algorithm for enhanced data security

V Bhujade, D Chaudhary - International Journal of Computer …, 2015 - academia.edu
Cryptography is one of the important and useful technique in which usually a particular file is
converted into unreadable format by using public key and private key system called as …

The Techniques of Vedic Mathematics for ECC Over Weierstrass Elliptic Curve Y2 = X3 + Ax + B

A Kumar, P Gupta, M Kumar - Advances in Communication and …, 2021 - Springer
An analysis is presented to the study, the proficient implementation of ancient mathematics
formulae for multiplications and squares in the cryptographic system. In this approach, we …

One variable polynomial division approach for elliptic curve arithmetic over prime fields

S Pote, V Sule, BK Lande - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
This paper presents an approach for point addition and doubling on elliptic curves over finite
fields F p which is based on one variable polynomial division. This is achieved by identifying …

[PDF][PDF] Year of Publication: 2015

V Bhujade, D Chaudhary - 2015 - academia.edu
Cryptography is one of the important and useful technique in which usually a particular file is
converted into unreadable format by using public key and private key system called as …