-
1
-
-
85024119519
-
-
The FIPS 186-4 Elliptic Curve Digital Signature Algorithm Validation System (ECDSA2VS), on 18 March
-
The FIPS 186-4 Elliptic Curve Digital Signature Algorithm Validation System (ECDSA2VS). Available online: http://csrc.nist.gov/groups/STM/cavp/documents/dss2/ecdsa2vs.pdf (accessed on 18 March 2014).
-
(2014)
-
-
-
2
-
-
84946224619
-
Hardware-software Co-design of elliptic curve digital signature algorithm over binary fields
-
Kochi, India, August
-
Panjwani, B.; Mehta, D.C. Hardware-software Co-design of elliptic curve digital signature algorithm over binary fields. In Proceedings of the International Conference on Advances in Computing, Communications and Informatics (ICACCI), Kochi, India, August 2015, 1101-1106, DOI: 10.1109/ICACCI.2015.7275757.
-
(2015)
Proceedings of the International Conference on Advances in Computing, Communications and Informatics (ICACCI)
, pp. 1101-1106
-
-
Panjwani, B.1
Mehta, D.C.2
-
3
-
-
84968484435
-
Speeding the pollard and elliptic curve methods of factorization
-
Montgomery, P.L. Speeding the pollard and elliptic curve methods of factorization. Mathematics of Computation 1987, 48, 177, 243-264, DOI: 10.1090/S0025-5718-1987-0866113-7.
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
, pp. 243-264
-
-
Montgomery, P.L.1
-
4
-
-
0003629991
-
Secure hash standard
-
National Institute of Standards and Technology, Federal Information Processing Standards Publications (FIPS PUBS)
-
National Institute of Standards and Technology. Secure hash standard. In Federal Information Processing Standards 180-2; Federal Information Processing Standards Publications (FIPS PUBS); 2002.
-
(2002)
Federal Information Processing Standards 180-2
-
-
-
5
-
-
77949831002
-
Analysis of ECDSA authentication processing in VANETs
-
Cairo, Egypt, 20-23 December
-
Petit, J.; Sabatier, P. Analysis of ECDSA authentication processing in VANETs. In Proceedings of the IEEE 3rd International Conference on New Technologies, Mobility and Security, Cairo, Egypt, 20-23 December 2009, 388-392, DOI: 10.1109/NTMS.2009.5384696.
-
(2009)
Proceedings of the IEEE 3Rd International Conference on New Technologies, Mobility and Security
, pp. 388-392
-
-
Petit, J.1
Sabatier, P.2
-
6
-
-
84875997854
-
Implementation of elliptic curve digital signature algorithm
-
Khalique, A.; Singh, K.; Sood, S. Implementation of elliptic curve digital signature algorithm. International Journal of Computer Applications 2010, 2, 2, 21-27, DOI:10.5120/631-876.
-
(2010)
International Journal of Computer Applications
, vol.2
, Issue.2
, pp. 21-27
-
-
Khalique, A.1
Singh, K.2
Sood, S.3
-
7
-
-
84868563226
-
Hardware implementation of elliptic curve digital signature algorithm (ECDSA) on Koblitz curves
-
Poznan, Poland 18-20 July
-
Nabil, G.; Naziha, K.; Lamia, F.; Lotfi, K. Hardware implementation of elliptic curve digital signature algorithm (ECDSA) on Koblitz curves. In Proceedings of the 8th International Symposium on Communication Systems, IEEE Networks and Digital Signal Processing (CSNDSP), Poznan, Poland 18-20 July 2012, 1-6, DOI: 10.1109/CSNDSP.2012.6292648.
-
(2012)
Proceedings of the 8Th International Symposium on Communication Systems, IEEE Networks and Digital Signal Processing (CSNDSP)
, pp. 1-6
-
-
Nabil, G.1
Naziha, K.2
Lamia, F.3
Lotfi, K.4
-
8
-
-
84959036300
-
Side-channel analysis of weierstrass and koblitz curve ecdsa on android smartphones
-
San Francisco, CA, USA, 29 February-4 March 2016 9610
-
Belgarric, P.; Fouque, P.A.; Macario-Rat, G.; Tibouchi, M. Side-channel analysis of weierstrass and koblitz curve ecdsa on android smartphones. In Proceedings of the Cryptographers’ Track at the RSA Conference on Topics in Cryptology CT-RSA, San Francisco, CA, USA, 29 February-4 March 2016 9610, 236-252, DOI: 10.1007/978-3-319-29485-814.
-
Proceedings of the Cryptographers’ Track at the RSA Conference on Topics in Cryptology CT-RSA
, pp. 236-252
-
-
Belgarric, P.1
Fouque, P.A.2
Macario-Rat, G.3
Tibouchi, M.4
-
9
-
-
84879136091
-
A cross-layer approach to privacy-preserving authentication in wave-enabled vanets
-
Biswas, S.; Misic, J. A cross-layer approach to privacy-preserving authentication in wave-enabled vanets. IEEE Transactions on Vehicular Technology 2013, 62, 2182-2192, DOI: 10.1109/TVT.2013.2238566.
-
(2013)
IEEE Transactions on Vehicular Technology
, vol.62
, pp. 2182-2192
-
-
Biswas, S.1
Misic, J.2
-
10
-
-
84884901656
-
Security-enabled near-field communication tag with flexible architecture supporting asymmetric cryptography
-
Plos, T.; Hutter, M.; Feldhofer, M.; Stiglic, M.; Cavaliere, F. Security-enabled near-field communication tag with flexible architecture supporting asymmetric cryptography. IEEE Transaction on Very Large Scale Integration (VLSI) System 2013, 21, 1965-1974, DOI: 10.1109/TVLSI.2012.2227849.
-
(2013)
IEEE Transaction on Very Large Scale Integration (VLSI) System
, vol.21
, pp. 1965-1974
-
-
Plos, T.1
Hutter, M.2
Feldhofer, M.3
Stiglic, M.4
Cavaliere, F.5
-
11
-
-
84930934217
-
Fast prime field elliptic-curve cryptography with 256-bit primes
-
Gueron, S.; Krasnov, V. Fast prime field elliptic-curve cryptography with 256-bit primes. Journal Cryptographic Engineering 2015, 5, 141-151, DOI:10.1007/s13389-014-0090-x.
-
(2015)
Journal Cryptographic Engineering
, vol.5
, pp. 141-151
-
-
Gueron, S.1
Krasnov, V.2
-
12
-
-
84911873444
-
Curved tags-a low-resource ecdsa implementation tailored for RFID
-
Oxford, UK 21-23 July 2014 8651
-
Pessl, P.; Hutter, M. Curved tags-a low-resource ecdsa implementation tailored for RFID. In Proceedings of the 10th International Workshop, RFIDSec, Revised Selected Papers Radio Frequency Identification: Security and Privacy Issues, Oxford, UK 21-23 July 2014 8651, 156-172, DOI: 10.1007/978-3-319-13066-810.
-
Proceedings of the 10Th International Workshop, Rfidsec, Revised Selected Papers Radio Frequency Identification: Security and Privacy Issues
, pp. 156-172
-
-
Pessl, P.1
Hutter, M.2
-
13
-
-
84908518520
-
Design of an elliptic curve cryptography processor for RFID tag chips
-
Liu, Z.; Liu, D.; Zou, X.; Lin, H.; Cheng, J. Design of an elliptic curve cryptography processor for RFID tag chips. Sensors MDPI 2014, 14, 17883-17904
-
(2014)
Sensors MDPI
, vol.14
, pp. 17883-17904
-
-
Liu, Z.1
Liu, D.2
Zou, X.3
Lin, H.4
Cheng, J.5
-
14
-
-
84930934710
-
Hot carrier injection stress effect on a 65 nm LNA at 70 GHz
-
Yuan, J.S.; Xu, Y.; Yen, S.D.; Bi, Y.; Hwang, G.W. Hot carrier injection stress effect on a 65 nm LNA at 70 GHz. IEEE Trans. Devices Mater. Reliab. 2014, 14, 931-934.
-
(2014)
IEEE Trans. Devices Mater. Reliab
, vol.14
, pp. 931-934
-
-
Yuan, J.S.1
Xu, Y.2
Yen, S.D.3
Bi, Y.4
Hwang, G.W.5
-
15
-
-
84920513957
-
Process and temperature robust voltage multiplier design for RF energy harvesting
-
Yuan, J.S.; Bi, Y. Process and temperature robust voltage multiplier design for RF energy harvesting. Microelectron. Reliab. 2014, 55, 107-133.
-
(2014)
Microelectron. Reliab
, vol.55
, pp. 107-133
-
-
Yuan, J.S.1
Bi, Y.2
-
16
-
-
85024130760
-
An efficient elliptic curve cryptography signature server with GPU acceleration
-
Pan, W.; Zheng, F.; Zhao, Y.; Zhu, W.T.; Jing, J. An efficient elliptic curve cryptography signature server with GPU acceleration. IEEE Trans. Inf. Forensics Secur. 2017 12, 111-122.
-
(2017)
IEEE Trans. Inf. Forensics Secur
, vol.12
, pp. 111-122
-
-
Pan, W.1
Zheng, F.2
Zhao, Y.3
Zhu, W.T.4
Jing, J.5
-
17
-
-
84958158234
-
Beyond the interconnections: Split manufacturing in RF designs
-
Bi, Y.; Yuan, J.S.; Jin, Y. Beyond the interconnections: Split manufacturing in RF designs. Electronics MDPI 2015, 4, 541-564.
-
(2015)
Electronics MDPI
, vol.4
, pp. 541-564
-
-
Bi, Y.1
Yuan, J.S.2
Jin, Y.3
-
18
-
-
85014769947
-
2 LEMI: Energy-efficient logic encryption using multiplexer insertion
-
Alasad, Q.; Bi, Y.; Yuan, J.S. E 2 LEMI: Energy-efficient logic encryption using multiplexer insertion. Electron. J. MDPI 2017, 6, 16.
-
(2017)
Electron. J. MDPI
, vol.6
, pp. 16
-
-
Alasad, Q.1
Bi, Y.2
Yuan, J.3
-
19
-
-
33745171465
-
Finding Collisions in the Full SHA-1
-
Santa Barbara, California, USA, Springer, August 14-18
-
Wang, X.; Yin, Y. L.; Yu H. Finding Collisions in the Full SHA-1. 25th Annual International Cryptology Conference, Santa Barbara, California, USA, Springer, August 14-18, 2005, 3621, 17-36.
-
(2005)
25Th Annual International Cryptology Conference
, vol.3621
, pp. 17-36
-
-
Wang, X.1
Yin, Y.L.2
Yu, H.3
-
20
-
-
84886703527
-
Grain: A stream cipher for constrained environments.
-
Hell, M.; Johansson T. Grain: A stream cipher for constrained environments. Int. J. Wirel. Mob. Comput. 2007, 2, 86-93.
-
(2007)
Int. J. Wirel. Mob. Comput
, vol.2
, pp. 86-93
-
-
Hell, M.1
Johansson, T.2
-
21
-
-
57849105842
-
An efficient cryptosystem Delta for stream cipher applications
-
Kanso, A.A. An efficient cryptosystem Delta for stream cipher applications. Computers and Electrical Engineering 2009, 35 126-140.
-
(2009)
Computers and Electrical Engineering
, vol.35
, pp. 126-140
-
-
Kanso, A.A.1
-
22
-
-
78649872685
-
An improved hardware implementation of the grain stream cipher
-
Lille, France, 1-3 September 2010
-
Mansouri, S.S.; Dubrova, E. An improved hardware implementation of the grain stream cipher. In Proceedings of the 13th Euromicro Conference on Digital System Design: Architectures, Methods, and Tools (DSD), Lille, France, 1-3 September 2010, 433-440.
-
Proceedings of the 13Th Euromicro Conference on Digital System Design: Architectures, Methods, and Tools (DSD)
, pp. 433-440
-
-
Mansouri, S.S.1
Dubrova, E.2
-
23
-
-
85024106506
-
Design and performance testing of arithmetic operators library for cryptographic applications
-
El hadj youssef, W.; Zeghid, M.; Machhout, M.; Rached, T. Design and performance testing of arithmetic operators library for cryptographic applications. International Journal Computer Science Engineering System (IJCSES) 2007, 1, pp. 201-212. https://pdfs.semanticscholar.org/ff7e/5a1de453bdce0be8fbccac049f2c3e64cd01.pdf
-
(2007)
International Journal Computer Science Engineering System (IJCSES)
, vol.1
, pp. 201-212
-
-
El Hadj Youssef, W.1
Zeghid, M.2
Machhout, M.3
Rached, T.4
-
24
-
-
70349717377
-
Architectural design features of a programmable high throughput reconfigurable SHA-2 Processor
-
Zeghid, M.; Bouallegue, B.; Machhout, M.; Baganne, A.; Tourki, R. Architectural design features of a programmable high throughput reconfigurable SHA-2 Processor. Journal of Information Assurance and Security 2008, 2, 147-158.
-
(2008)
Journal of Information Assurance and Security
, vol.2
, pp. 147-158
-
-
Zeghid, M.1
Bouallegue, B.2
Machhout, M.3
Baganne, A.4
Tourki, R.5
-
25
-
-
85018445280
-
-
arXiv 2015, arXiv:0710.4810 [cs.CR]
-
Sghaier, A.; Zeghid, M.; Bouallegue, B.; Baganne, A.; Machhout, M. Area-time efficient hardware implementation of elliptic curve cryptosystem. arXiv 2015, arXiv:0710.4810 [cs.CR].
-
Area-Time efficient Hardware Implementation of Elliptic Curve Cryptosystem
-
-
Sghaier, A.1
Zeghid, M.2
Bouallegue, B.3
Baganne, A.4
Machhout, M.5
-
26
-
-
84866299580
-
Efficient elliptic curve point multiplication using digit-serial binary field operations
-
Sutter, G.; Deschamps, J.; Imana, J. Efficient elliptic curve point multiplication using digit-serial binary field operations. IEEE Trans. Ind. Electron. 2013, 60, 217-225.
-
(2013)
IEEE Trans. Ind. Electron
, vol.60
, pp. 217-225
-
-
Sutter, G.1
Deschamps, J.2
Imana, J.3
-
27
-
-
84876785065
-
Theoretical modeling of elliptic curve scalar multiplier on LUT-based FPGAs for area and speed
-
Roy, S.; Rebeiro, C.; Mukhopadhyay, D. Theoretical modeling of elliptic curve scalar multiplier on LUT-based FPGAs for area and speed. IEEE Trans. VLSI Syst. 2013, 21, 901-909.
-
(2013)
IEEE Trans. VLSI Syst
, vol.21
, pp. 901-909
-
-
Roy, S.1
Rebeiro, C.2
Mukhopadhyay, D.3
-
28
-
-
84922960300
-
High Performance FPGA implementation of elliptic curve cryptography over binary fields
-
Beijing, China, 24-26 September
-
Liu, S.; Ju, L.; Cai, X.; Jia, Z.; Zhang, Z. High Performance FPGA implementation of elliptic curve cryptography over binary fields. In Proceedings of the IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Beijing, China, 24-26 September 2014, 148-155, DOI: 10.1109/TrustCom.2014.23.
-
(2014)
Proceedings of the IEEE 13Th International Conference on Trust, Security and Privacy in Computing and Communications (Trustcom)
, pp. 148-155
-
-
Liu, S.1
Ju, L.2
Cai, X.3
Jia, Z.4
Zhang, Z.5
-
29
-
-
84962428080
-
m)
-
Lausanne, Switzerland, 2-4 September 2015
-
m). In Proceedings of the International Conference on Field-programmable Logic and Applications (FPL), Lausanne, Switzerland, 2-4 September 2015, 1-6, DOI: 10.1109/FPL.2015.7293951.
-
Proceedings of the International Conference on Field-Programmable Logic and Applications (FPL)
, pp. 1-6
-
-
Khan, Z.U.A.1
Benaissa, M.2
-
30
-
-
0003185688
-
La cryptographie militaire
-
Kerckhoffs, A. La cryptographie militaire. J. Sci. Militaires 1883, IX, 5-38.
-
(1883)
J. Sci. Militaires
, vol.9
, pp. 5-38
-
-
Kerckhoffs, A.1
-
31
-
-
85024121301
-
Transfert sécurisé d’images par combinaison de techniques de compression, cryptage et marquage
-
Université Montpellier II
-
Rodrigues, J.M. Transfert sécurisé d’images par combinaison de techniques de compression, cryptage et marquage. In Thèse Soutenue, Université Montpellier II; 2006.
-
(2006)
Thèse Soutenue
-
-
Rodrigues, J.M.1
-
32
-
-
0003822632
-
-
on April
-
Rukhin, A.; Soto, J.; Nechvatal, J.; Smid, M.; Barker, E.; Leigh, S.; Levenson, M.; Vangel, M.; Banks, D.; Heckert, A.; et al. A statistical test suite for random and pseudo-random number generator for cryptographic applications. http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-22r1a.pdf (accessed on April 2010).
-
(2010)
A Statistical Test Suite for Random and Pseudo-Random Number Generator for Cryptographic Applications
-
-
Rukhin, A.1
Soto, J.2
Nechvatal, J.3
Smid, M.4
Barker, E.5
Leigh, S.6
Levenson, M.7
Vangel, M.8
Banks, D.9
Heckert, A.10
-
33
-
-
85050348555
-
Low power elliptic curve digital signature design for constrained devices
-
Elhadjyoussef, W.; Benhadjyoussef, N.; Machhout, M.; Rached T. Low power elliptic curve digital signature design for constrained devices. Int. J. Secur. (IJS) 2012, 6, 2.
-
(2012)
Int. J. Secur. (IJS)
, vol.6
, pp. 2
-
-
Elhadjyoussef, W.1
Benhadjyoussef, N.2
Machhout, M.3
Rached, T.4
-
34
-
-
84931096056
-
A low-resource 32-bit datapath ECDSA design for embedded applications
-
Rome, Italy, 13-16 October
-
Ben Hadj Youssef, N.; El Hadj Youssef, W.; Machhout, M.; Tourki, R.; Torki, K. A low-resource 32-bit datapath ECDSA design for embedded applications. In Proceedings of the International Carnahan Conference on Security Technology (ICCST), Rome, Italy, 13-16 October 2014; pp. 1-6.
-
(2014)
Proceedings of the International Carnahan Conference on Security Technology (ICCST)
, pp. 1-6
-
-
Ben Hadj Youssef, N.1
El Hadj Youssef, W.2
Machhout, M.3
Tourki, R.4
Torki, K.5
-
35
-
-
85024088648
-
Signature verification a road towards safer traffic
-
Knezevic, M.; Nikov, V.; Rombouts P. Low-latency ECDSA signature verification a road towards safer traffic. Cryptol. ePrint Arch. 2014, 24, 3257-3267.
-
(2014)
Cryptol. Eprint Arch.
, vol.24
, pp. 3257-3267
-
-
Knezevic, M.1
Nikov, V.2
Rombouts, P.3
Low-Latency, E.4
-
37
-
-
35048868592
-
The Security of DSA and ECDSA
-
Springer-Verlag Berlin Heidelberg, Miami, Florida, USA
-
Vaudenay, S. The Security of DSA and ECDSA. International Workshop on Public Key Cryptography PKC 2003: Public Key Cryptography-PKC, Springer-Verlag Berlin Heidelberg, Miami, Florida, USA, 2003 2567, 309-323.
-
(2003)
International Workshop on Public Key Cryptography PKC 2003: Public Key Cryptography-Pkc
, vol.2567
, pp. 309-323
-
-
Vaudenay, S.1
-
38
-
-
85048219194
-
Hardware activation by means of PUFs and elliptic curve cryptography in field-programmable devices
-
Parrilla, L.; Castillo, E.; Morales, P.D.; Garcia, A. hardware activation by means of PUFs and elliptic curve cryptography in field-programmable devices. Electron. J. MDPI 2016, 5.
-
(2016)
Electron. J. MDPI
, pp. 5
-
-
Parrilla, L.1
Castillo, E.2
Morales, P.D.3
Garcia, A.4
|