Elliptic curve point multiplication on GPUs

S Antao, JC Bajard, L Sousa - ASAP 2010-21st IEEE …, 2010 - ieeexplore.ieee.org
Acceleration of cryptographic applications on Graphical Processing Units (GPUs) platforms
is a research topic with practical interest, because these platforms provide huge …

Fast unified elliptic curve point multiplication for NIST prime curves on FPGAs

T Wu, R Wang - Journal of Cryptographic Engineering, 2019 - Springer
Elliptic curve cryptography has been widely used in public key cryptography, which applies
shorter keys to achieve the same security level of RSA cryptosystems. This communication …

Hardware implementation of SM2 ECC protocols on FPGAs

T Wu, J Ye, J Lu - 2021 IEEE 5th Information Technology …, 2021 - ieeexplore.ieee.org
The SM2 elliptic curve public key cryptography (ECC) is a Chinese commercial cryptography
standard similar to National Institute of Standards and Technology (NIST) ECC. The …

Cicada: A framework for private non-interactive on-chain auctions and voting

N Glaeser, IA Seres, M Zhu, J Bonneau - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Auction and voting schemes play a crucial role in the Web3 ecosystem. Yet currently
deployed implementations either lack privacy or require at least two rounds, hindering …

Fast RNS Implementation of Elliptic Curve Point Multiplication on FPGAs

T Wu - Journal of Signal Processing Systems, 2025 - Springer
Elliptic curve cryptography is the second most important public-key cryptography following
RSA cryptography. The fundamental arithmetic of elliptic curve cryptography is a series of …

Residue systems efficiency for modular products summation: Application to Elliptic Curves Cryptography

JC Bajard, S Duquesne, M Ercegovac… - Advanced Signal …, 2006 - spiedigitallibrary.org
Residue systems of representation, like Residue Number Systems (RNS) for primary field
(GF (p)) or Trinomial Residue Arithmetic for binary field (GF (2 k)), are characterized by …

Machine-learning assisted side-channel attacks on RNS ECC implementations using hybrid feature engineering

N Mukhtar, L Papachristodoulou, AP Fournaris… - … on Constructive Side …, 2022 - Springer
Abstract Machine learning-based side-channel attacks have recently been introduced to
recover the secret information from protected software and hardware implementations …

Machine-learning assisted side-channel attacks on RNS-based elliptic curve implementations using hybrid feature engineering

N Mukhtar, L Papachristodoulou… - Cryptology ePrint …, 2020 - eprint.iacr.org
Side-channel attacks based on machine learning have recently been introduced to recover
the secret information from software and hardware implementations of mathematically …

一种新的余数系统下快速计算素域椭圆曲线点乘的方法

吴焘, 李树国, 刘理天 - 计算机工程与科学, 2014 - joces.nudt.edu.cn
椭圆曲线密码运算主要是椭圆曲线点乘, 后者由一系列的模乘构成. 利用余数系统下的蒙哥马利
模乘算法, 素域中对阶取模余的模乘可以转化为对余数系统基底取模余. 提出一种新的余数系统 …

[PDF][PDF] Machine learning-based side-channel analysis of cryptographic chips

N Mukhtar - 2021 - figshare.mq.edu.au
Advances in communication and network systems have given rise to a new era of
revolutionary technology known as Internet of Things (IoT): a world where everything is …