메뉴 건너뛰기




Volumn 6, Issue 2, 2017, Pages

Design and implementation of low area/power elliptic curve digital signature hardware core

Author keywords

ASIC; Digital signature; Embedded systems; Hardware architecture; Low area; Low power; Optimization; Security analyses

Indexed keywords


EID: 85024096563     PISSN: None     EISSN: 20799292     Source Type: Journal    
DOI: 10.3390/electronics6020046     Document Type: Article
Times cited : (29)

References (38)
  • 1
    • 85024119519 scopus 로고    scopus 로고
    • The FIPS 186-4 Elliptic Curve Digital Signature Algorithm Validation System (ECDSA2VS), on 18 March
    • The FIPS 186-4 Elliptic Curve Digital Signature Algorithm Validation System (ECDSA2VS). Available online: http://csrc.nist.gov/groups/STM/cavp/documents/dss2/ecdsa2vs.pdf (accessed on 18 March 2014).
    • (2014)
  • 3
    • 84968484435 scopus 로고
    • Speeding the pollard and elliptic curve methods of factorization
    • Montgomery, P.L. Speeding the pollard and elliptic curve methods of factorization. Mathematics of Computation 1987, 48, 177, 243-264, DOI: 10.1090/S0025-5718-1987-0866113-7.
    • (1987) Mathematics of Computation , vol.48 , Issue.177 , pp. 243-264
    • Montgomery, P.L.1
  • 4
    • 0003629991 scopus 로고    scopus 로고
    • Secure hash standard
    • National Institute of Standards and Technology, Federal Information Processing Standards Publications (FIPS PUBS)
    • National Institute of Standards and Technology. Secure hash standard. In Federal Information Processing Standards 180-2; Federal Information Processing Standards Publications (FIPS PUBS); 2002.
    • (2002) Federal Information Processing Standards 180-2
  • 9
    • 84879136091 scopus 로고    scopus 로고
    • A cross-layer approach to privacy-preserving authentication in wave-enabled vanets
    • Biswas, S.; Misic, J. A cross-layer approach to privacy-preserving authentication in wave-enabled vanets. IEEE Transactions on Vehicular Technology 2013, 62, 2182-2192, DOI: 10.1109/TVT.2013.2238566.
    • (2013) IEEE Transactions on Vehicular Technology , vol.62 , pp. 2182-2192
    • Biswas, S.1    Misic, J.2
  • 11
    • 84930934217 scopus 로고    scopus 로고
    • Fast prime field elliptic-curve cryptography with 256-bit primes
    • Gueron, S.; Krasnov, V. Fast prime field elliptic-curve cryptography with 256-bit primes. Journal Cryptographic Engineering 2015, 5, 141-151, DOI:10.1007/s13389-014-0090-x.
    • (2015) Journal Cryptographic Engineering , vol.5 , pp. 141-151
    • Gueron, S.1    Krasnov, V.2
  • 13
    • 84908518520 scopus 로고    scopus 로고
    • Design of an elliptic curve cryptography processor for RFID tag chips
    • Liu, Z.; Liu, D.; Zou, X.; Lin, H.; Cheng, J. Design of an elliptic curve cryptography processor for RFID tag chips. Sensors MDPI 2014, 14, 17883-17904
    • (2014) Sensors MDPI , vol.14 , pp. 17883-17904
    • Liu, Z.1    Liu, D.2    Zou, X.3    Lin, H.4    Cheng, J.5
  • 15
    • 84920513957 scopus 로고    scopus 로고
    • Process and temperature robust voltage multiplier design for RF energy harvesting
    • Yuan, J.S.; Bi, Y. Process and temperature robust voltage multiplier design for RF energy harvesting. Microelectron. Reliab. 2014, 55, 107-133.
    • (2014) Microelectron. Reliab , vol.55 , pp. 107-133
    • Yuan, J.S.1    Bi, Y.2
  • 16
    • 85024130760 scopus 로고    scopus 로고
    • An efficient elliptic curve cryptography signature server with GPU acceleration
    • Pan, W.; Zheng, F.; Zhao, Y.; Zhu, W.T.; Jing, J. An efficient elliptic curve cryptography signature server with GPU acceleration. IEEE Trans. Inf. Forensics Secur. 2017 12, 111-122.
    • (2017) IEEE Trans. Inf. Forensics Secur , vol.12 , pp. 111-122
    • Pan, W.1    Zheng, F.2    Zhao, Y.3    Zhu, W.T.4    Jing, J.5
  • 17
    • 84958158234 scopus 로고    scopus 로고
    • Beyond the interconnections: Split manufacturing in RF designs
    • Bi, Y.; Yuan, J.S.; Jin, Y. Beyond the interconnections: Split manufacturing in RF designs. Electronics MDPI 2015, 4, 541-564.
    • (2015) Electronics MDPI , vol.4 , pp. 541-564
    • Bi, Y.1    Yuan, J.S.2    Jin, Y.3
  • 18
    • 85014769947 scopus 로고    scopus 로고
    • 2 LEMI: Energy-efficient logic encryption using multiplexer insertion
    • Alasad, Q.; Bi, Y.; Yuan, J.S. E 2 LEMI: Energy-efficient logic encryption using multiplexer insertion. Electron. J. MDPI 2017, 6, 16.
    • (2017) Electron. J. MDPI , vol.6 , pp. 16
    • Alasad, Q.1    Bi, Y.2    Yuan, J.3
  • 19
    • 33745171465 scopus 로고    scopus 로고
    • Finding Collisions in the Full SHA-1
    • Santa Barbara, California, USA, Springer, August 14-18
    • Wang, X.; Yin, Y. L.; Yu H. Finding Collisions in the Full SHA-1. 25th Annual International Cryptology Conference, Santa Barbara, California, USA, Springer, August 14-18, 2005, 3621, 17-36.
    • (2005) 25Th Annual International Cryptology Conference , vol.3621 , pp. 17-36
    • Wang, X.1    Yin, Y.L.2    Yu, H.3
  • 20
    • 84886703527 scopus 로고    scopus 로고
    • Grain: A stream cipher for constrained environments.
    • Hell, M.; Johansson T. Grain: A stream cipher for constrained environments. Int. J. Wirel. Mob. Comput. 2007, 2, 86-93.
    • (2007) Int. J. Wirel. Mob. Comput , vol.2 , pp. 86-93
    • Hell, M.1    Johansson, T.2
  • 21
    • 57849105842 scopus 로고    scopus 로고
    • An efficient cryptosystem Delta for stream cipher applications
    • Kanso, A.A. An efficient cryptosystem Delta for stream cipher applications. Computers and Electrical Engineering 2009, 35 126-140.
    • (2009) Computers and Electrical Engineering , vol.35 , pp. 126-140
    • Kanso, A.A.1
  • 26
    • 84866299580 scopus 로고    scopus 로고
    • Efficient elliptic curve point multiplication using digit-serial binary field operations
    • Sutter, G.; Deschamps, J.; Imana, J. Efficient elliptic curve point multiplication using digit-serial binary field operations. IEEE Trans. Ind. Electron. 2013, 60, 217-225.
    • (2013) IEEE Trans. Ind. Electron , vol.60 , pp. 217-225
    • Sutter, G.1    Deschamps, J.2    Imana, J.3
  • 27
    • 84876785065 scopus 로고    scopus 로고
    • Theoretical modeling of elliptic curve scalar multiplier on LUT-based FPGAs for area and speed
    • Roy, S.; Rebeiro, C.; Mukhopadhyay, D. Theoretical modeling of elliptic curve scalar multiplier on LUT-based FPGAs for area and speed. IEEE Trans. VLSI Syst. 2013, 21, 901-909.
    • (2013) IEEE Trans. VLSI Syst , vol.21 , pp. 901-909
    • Roy, S.1    Rebeiro, C.2    Mukhopadhyay, D.3
  • 30
    • 0003185688 scopus 로고
    • La cryptographie militaire
    • Kerckhoffs, A. La cryptographie militaire. J. Sci. Militaires 1883, IX, 5-38.
    • (1883) J. Sci. Militaires , vol.9 , pp. 5-38
    • Kerckhoffs, A.1
  • 31
    • 85024121301 scopus 로고    scopus 로고
    • Transfert sécurisé d’images par combinaison de techniques de compression, cryptage et marquage
    • Université Montpellier II
    • Rodrigues, J.M. Transfert sécurisé d’images par combinaison de techniques de compression, cryptage et marquage. In Thèse Soutenue, Université Montpellier II; 2006.
    • (2006) Thèse Soutenue
    • Rodrigues, J.M.1
  • 38
    • 85048219194 scopus 로고    scopus 로고
    • Hardware activation by means of PUFs and elliptic curve cryptography in field-programmable devices
    • Parrilla, L.; Castillo, E.; Morales, P.D.; Garcia, A. hardware activation by means of PUFs and elliptic curve cryptography in field-programmable devices. Electron. J. MDPI 2016, 5.
    • (2016) Electron. J. MDPI , pp. 5
    • Parrilla, L.1    Castillo, E.2    Morales, P.D.3    Garcia, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.