메뉴 건너뛰기




Volumn 5927 LNCS, Issue , 2009, Pages 63-79

Hardware/software co-design of public-key cryptography for SSL protocol execution in embedded systems

Author keywords

[No Author keywords available]

Indexed keywords

ARITHMETIC OPERATIONS; CELL PHONE; CO-DESIGNS; CRYPTOGRAPHIC ALGORITHMS; DE FACTO STANDARD; ELLIPTIC CURVE; ELLIPTIC CURVE CRYPTOGRAPHY; HARDWARE/SOFTWARE CO-DESIGN; INSECURE NETWORKS; INSTRUCTION SET EXTENSION; NETWORK CONNECTIVITY; OPEN SSL; PRIME FIELD; PROCESSING CAPABILITY; PROCESSOR CORES; PUBLIC KEY ALGORITHMS; PUBLIC KEYS; REPLAY ATTACK; RESOURCE-RESTRICTED DEVICES; SECURE COMMUNICATIONS; SECURE NETWORKS; SECURE SOCKETS LAYERS; SOFTWARE IMPLEMENTATION; SOFTWARE PARTS; SPEED-UPS; SSL PROTOCOL;

EID: 76549084659     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-11145-7_7     Document Type: Conference Paper
Times cited : (4)

References (36)
  • 1
    • 0034228518 scopus 로고    scopus 로고
    • Securing electronic commerce: Reducing the SSL overhead
    • Apostolopoulos, G., Peris, V.G., Pradhan, P., Saha, D.: Securing electronic commerce: Reducing the SSL overhead. IEEE Network 14(4), 8-16 (2000)
    • (2000) IEEE Network , vol.14 , Issue.4 , pp. 8-16
    • Apostolopoulos, G.1    Peris, V.G.2    Pradhan, P.3    Saha, D.4
  • 8
    • 76549094837 scopus 로고    scopus 로고
    • Dierks, T, Rescorla, E.K, The Transport Layer Security (TLS) Protocol Version 1.1. Internet Engineering Task Force, Network Working Group, RFC 4346 2006
    • Dierks, T., Rescorla, E.K.: The Transport Layer Security (TLS) Protocol Version 1.1. Internet Engineering Task Force, Network Working Group, RFC 4346 (2006)
  • 9
    • 76549106951 scopus 로고    scopus 로고
    • Freier, A.O, Karlton, P, Kocher, P.C, The SSL Protocol Version 3.0. Internet Draft November 1996
    • Freier, A.O., Karlton, P., Kocher, P.C.: The SSL Protocol Version 3.0. Internet Draft (November 1996), http://wp.netscape.com/eng/ssl3/draft302.txt
  • 10
    • 76549115377 scopus 로고    scopus 로고
    • Gaisler, J.: The LEON-2 Processor User's Manual (Version 1.0.10) (January 2003), http://www.gaisler.com/doc/leon2-1.0.10.pdf
    • Gaisler, J.: The LEON-2 Processor User's Manual (Version 1.0.10) (January 2003), http://www.gaisler.com/doc/leon2-1.0.10.pdf
  • 11
    • 0242277358 scopus 로고    scopus 로고
    • Großschädl, J., Kamendje, G.-A.: Architectural enhancements for Montgomery multiplication on embedded RISC processors. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, 2846, pp. 418-434. Springer, Heidelberg (2003)
    • Großschädl, J., Kamendje, G.-A.: Architectural enhancements for Montgomery multiplication on embedded RISC processors. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 418-434. Springer, Heidelberg (2003)
  • 12
    • 33750709739 scopus 로고    scopus 로고
    • m). In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, 3156, pp. 133-147. Springer, Heidelberg (2004)
    • m). In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 133-147. Springer, Heidelberg (2004)
  • 17
    • 35248885280 scopus 로고    scopus 로고
    • Gura, N., Chang Shantz, S., Eberle, H., Gupta, S., Gupta, V., Finchelstein, D., Goupy, E., Stebila, D.: An end-to-end systems approach to elliptic curve cryptography. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, 2523, pp. 349-365. Springer, Heidelberg (2003)
    • Gura, N., Chang Shantz, S., Eberle, H., Gupta, S., Gupta, V., Finchelstein, D., Goupy, E., Stebila, D.: An end-to-end systems approach to elliptic curve cryptography. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 349-365. Springer, Heidelberg (2003)
  • 20
    • 33947133829 scopus 로고    scopus 로고
    • Institute of Electrical and Electronics Engineers (IEEE, IEEE Standard Specifications for Public-Key Cryptography August
    • Institute of Electrical and Electronics Engineers (IEEE). IEEE Std 1363-2000: IEEE Standard Specifications for Public-Key Cryptography (August 2000)
    • (2000) IEEE Std , pp. 1363-2000
  • 21
    • 0001464763 scopus 로고
    • Multiplication of multidigit numbers on automata
    • Karatsuba, A.A., Ofman, Y.P.: Multiplication of multidigit numbers on automata. Soviet Physics - Doklady 7(7), 595-596 (1963)
    • (1963) Soviet Physics - Doklady , vol.7 , Issue.7 , pp. 595-596
    • Karatsuba, A.A.1    Ofman, Y.P.2
  • 22
    • 0030172012 scopus 로고    scopus 로고
    • Analyzing and comparing Montgomery multiplication algorithms
    • Koç, Ç.K., Acar, T., Kaliski, B.S.: Analyzing and comparing Montgomery multiplication algorithms. IEEE Micro 16(3), 26-33 (1996)
    • (1996) IEEE Micro , vol.16 , Issue.3 , pp. 26-33
    • Koç, C.K.1    Acar, T.2    Kaliski, B.S.3
  • 23
    • 58449112739 scopus 로고    scopus 로고
    • Koschuch, M., Großscḧadl, J., Payer, U., Hudler, M., Krüger, M.: Workload characterization of a lightweight SSL implementation resistant to side-channel attacks. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, 5339, pp. 349-365. Springer, Heidelberg (2008)
    • Koschuch, M., Großscḧadl, J., Payer, U., Hudler, M., Krüger, M.: Workload characterization of a lightweight SSL implementation resistant to side-channel attacks. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 349-365. Springer, Heidelberg (2008)
  • 25
    • 84966243285 scopus 로고
    • Modular multiplication without trial division
    • Montgomery, P.L.: Modular multiplication without trial division. Mathematics of Computation 44(170), 519-521 (1985)
    • (1985) Mathematics of Computation , vol.44 , Issue.170 , pp. 519-521
    • Montgomery, P.L.1
  • 26
    • 77953904148 scopus 로고    scopus 로고
    • Recommendation for Key Management - Part 1: General (Revised)
    • March
    • National Institute of Standards and Technology (NIST). Recommendation for Key Management - Part 1: General (Revised). Special Publication 800-57 (March 2007), http://csrc.nist.gov/publications/PubsSPs.html
    • (2007) Special Publication , vol.800 -57
  • 27
    • 76549131659 scopus 로고    scopus 로고
    • NSA Suite B Cryptography
    • National Security Agency NSA, March
    • National Security Agency (NSA). NSA Suite B Cryptography. Fact sheet (March 2008), http://www.nsa.gov/ia/programs/suiteb-cryptography/
    • (2008) Fact sheet
  • 28
    • 76549112327 scopus 로고    scopus 로고
    • OpenSSL Project, September 2006
    • OpenSSL Project. OpenSSL 0.9.7k. (September 2006), http://www.openssl.org
    • OpenSSL 0.9.7k
  • 29
    • 76549131382 scopus 로고    scopus 로고
    • PeerSec Networks, Inc
    • PeerSec Networks, Inc. MatrixSSL 1.7.1. (2005), http://www.matrixssl.org
    • (2005) MatrixSSL 1.7.1
  • 30
    • 33646382089 scopus 로고    scopus 로고
    • A study of the energy consumption characteristics of cryptographic algorithms and security protocols
    • Potlapally, N.R., Ravi, S., Raghunathan, A., Jha, N.K.: A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Transactions on Mobile Computing 5(2), 128-143 (2006)
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.2 , pp. 128-143
    • Potlapally, N.R.1    Ravi, S.2    Raghunathan, A.3    Jha, N.K.4
  • 34
    • 23944524767 scopus 로고    scopus 로고
    • Standards for Efficient Cryptography Group SECG
    • Standards for Efficient Cryptography Group (SECG). SEC 1: Elliptic Curve Cryptography (2000), http://www.secg.org/download/aid-385/sec1-final.pdf
    • (2000) SEC 1: Elliptic Curve Cryptography
  • 35
    • 0028464667 scopus 로고
    • Hardware-software co-design of embedded systems
    • Wolf, W.H.: Hardware-software co-design of embedded systems. Proceedings of the IEEE 28(7), 967-989 (1994)
    • (1994) Proceedings of the IEEE , vol.28 , Issue.7 , pp. 967-989
    • Wolf, W.H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.