A tiny RSA cryptosystem based on Arduino microcontroller useful for small scale networks

QA Al-Haija, M Al Tarayrah, H Al-Qadeeb… - Procedia Computer …, 2014 - Elsevier
RSA Cryptography is a well-known example of public key cryptographic algorithms that
involves robust encryption/decryption processes. In this paper, a microcontroller based RSA …

Design and leakage assessment of side channel attack resistant binary edwards Elliptic Curve digital signature algorithm architectures

AP Fournaris, C Dimopoulos, A Moschos… - Microprocessors and …, 2019 - Elsevier
Abstract Considering that Elliptic Curve Digital Signature Algorithm (ECDSA)
implementations need to be efficient, flexible and Side Channel Attack (SCA) resistant, in …

A high speed scalar multiplier for binary edwards curves

AP Fournaris, N Sklavos, C Koulamas - Proceedings of the Third …, 2016 - dl.acm.org
Binary Edwards Curves (BEC) constitute an exciting elliptic curve variation that has very
interesting benefits when it comes to side channel attack resistance. However, BECs require …

Affine coordinate binary edwards curve scalar multiplier with side channel attack resistance

AP Fournaris, O Koufopavlou - 2015 Euromicro Conference on …, 2015 - ieeexplore.ieee.org
Taking into account the high regularity and completeness of Binary Edwards Curves (BEC),
BEC point operation efficient implementation in hardware becomes a need especially since …

Efficient FPGA implementation of RSA coprocessor using scalable modules

QA Al-Haija, M Smadi, M Al-Ja'fari… - Procedia Computer …, 2014 - Elsevier
RSA Cryptosystem is considered the first practicable secure algorithm that can be used to
protect information during the communication. The significance of high security and efficient …

A proxy partially blind signature approach using elliptic curve cryptosystem

N Tahat, EE Abdallah - International Journal of …, 2016 - inderscienceonline.com
Partially blind signature is cryptographic system that is used in several protocols including e-
cash and e-commerce systems. In proxy partially blind signature, part of the message is …

A design strategy for digit serial multiplier based binary Edwards curve scalar multiplier architectures

AP Fournaris, C Dimopoulos… - … Conference on Digital …, 2017 - ieeexplore.ieee.org
Binary Edwards Curves (BEC) constitute an alternative to the standardized Weierstrass
elliptic curve (EC) equations since the latter have intrinsic side channel attack vulnerabilities …

Fast Radix-2 Sequential Multiplier Using Kintex-7 FPGA Chip Family

QA Al-Haija, SMS Ahmad - The Open Cybernetics & Systemics …, 2018 - benthamopen.com
Background: This paper presents description on the implementation of fast radix-2
sequential multiplier using repeated carry save addition (CSA) method with variable data …

[PDF][PDF] Binary Edwards Curve Design Strategy for Efficient and Power Attack Resistant Architectures

AP Fournaris, N Sklavos - 4th TRUDEVICE Workshop on Secure …, 2015 - researchgate.net
Taking into account the high regularity and completeness of Binary Edwards Curves (BEC),
BEC point operation efficient implementation in hardware becomes a need especially since …

[PDF][PDF] High Speed Power Analysis Attack Resistant Scalar Multplier for Binary Edwards Curves

AP Fournaris, N Sklavos, C Koulamas - 2016 - researchgate.net
ABSTRACT Binary Edwards Curves (BEC) constitute an exciting elliptic curve variation that
has very interesting benefits when it comes to side channel attack resistance. However …