A low area high speed FPGA implementation of AES architecture for cryptography application

TM Kumar, KS Reddy, S Rinaldi, BD Parameshachari… - Electronics, 2021 - mdpi.com
Nowadays, a huge amount of digital data is frequently changed among different embedded
devices over wireless communication technologies. Data security is considered an important …

A Systematic Review of Fast, Scalable, and Efficient Hardware Implementations of Elliptic Curve Cryptography for Blockchain

R Ifrim, D Loghin, D Popescu - ACM Transactions on Reconfigurable …, 2024 - dl.acm.org
Blockchain technology entered the enterprise domain under the name of permissioned
blockchains and hybrid or verifiable database systems, as they provide a distributed solution …

COME-UP: Computation offloading in mobile edge computing with LSTM based user direction prediction

SKU Zaman, AI Jehangiri, T Maqsood, AI Umar… - Applied Sciences, 2022 - mdpi.com
In mobile edge computing (MEC), mobile devices limited to computation and memory
resources offload compute-intensive tasks to nearby edge servers. User movement causes …

Cryptosystem design based on Hermitian curves for IoT security

OA Alzubi, JA Alzubi, O Dorgham… - The Journal of …, 2020 - Springer
The ultimate goal of modern cryptography is to protect the information resource and make it
absolutely unbreakable and beyond compromise. However, throughout the history of …

An area-time efficient point-multiplication architecture for ECC over GF (2m) using polynomial basis

PKG Nadikuda, L Boppana - Microprocessors and Microsystems, 2022 - Elsevier
The modern age has seen an enormous progress in communications. Millions of devices
communicate over the web transmitting confidential information which sometimes is of …

Low area-time complexity point multiplication architecture for ECC over GF() using polynomial basis

PKG Nadikuda, L Boppana - Journal of Cryptographic Engineering, 2023 - Springer
In the present day, billions of devices communicate over the wireless networks. The massive
information transmitted over open ended, and unsecured Internet architecture results in …

A High Speed and Area Efficient Processor for Elliptic Curve Scalar Point Multiplication for GF()

M Thirumoorthi, AJ Leigh, M Heidarpur… - … Transactions on Very …, 2024 - ieeexplore.ieee.org
Binary polynomial multipliers impact the overall performance and cost of elliptic curve
cryptography (ECC) systems. Multiplication algorithms with subquadratic computational …

Hardware-accelerated cryptography for software-defined networks with P4

L Malina, D Smekal, S Ricci, J Hajny, P Cíbik… - International Conference …, 2020 - Springer
The paper presents a hardware-accelerated cryptographic solution for Field Programmable
Gate Array (FPGA) based network cards that provide throughput up to 200 Gpbs. Our …

Reconfigurable Electronic Platforms: A Top-Down Approach to Learn about Design and Integration of Electronic Systems

A Rivadeneyra, FJ Romero, M Haider, VD Bhatt… - Micromachines, 2022 - mdpi.com
This case report presents a real example of a study which introduces the use of
reconfigurable platforms in the teaching of electronics engineering to establish a bridge …

Hybrid scheduling to enhance reliability of real-time tasks running on reconfigurable devices

A Ghavidel, Y Sedaghat, M Naghibzadeh - The Journal of …, 2020 - Springer
Reconfigurable devices (RDs) are extremely advantageous when employed in real-time
embedded systems. Nonetheless, they are susceptible to soft errors. In a broad sense, the …