A new approach to elliptic curve cryptography: An RNS architecture

被引:25
|
作者
Schinianakis, D. M. [1 ]
Kakarountas, A. P. [1 ]
Stouraitis, T. [1 ]
机构
[1] Univ Patras, Dept Elect & Comp Engn, Patras, Greece
关键词
D O I
10.1109/MELCON.2006.1653327
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
An Elliptic Curve Point Multiplier (ECPM) is the main part of all Elliptic Curve Cryptography (ECC) systems and its performance is decisive for the performance of the overall cryptosystem. A VLSI Residue Number System (RNS) architecture of an ECPM is presented in this paper. In the proposed approach, the necessary mathematical conditions that need to be satisfied, in order to replace typical finite field circuits with RNS ones, are investigated. It is shown that such an application is feasible and that it leads to a significant improvement in the execution time of a scalar point multiplication.
引用
收藏
页码:1241 / 1245
页数:5
相关论文
共 50 条
  • [31] An Efficient Many-Core Architecture for Elliptic Curve Cryptography Security Assessment
    Indaco, Marco
    Lauri, Fabio
    Miele, Andrea
    Trotta, Pascal
    [J]. 2015 25TH INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS, 2015,
  • [32] CREATING AN ELLIPTIC CURVE ARITHMETIC UNIT FOR USE IN ELLIPTIC CURVE CRYPTOGRAPHY
    Fournaris, Apostolos P.
    Koufopavlou, Odysseas
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION, PROCEEDINGS, 2008, : 1457 - 1464
  • [33] 65-nm CMOS low-energy RNS modular multiplier for elliptic-curve cryptography
    [J]. Asif, Shahzad (shahzad.asif@mq.edu.au), 2018, John Wiley and Sons Inc (12):
  • [34] 65-nm CMOS low-energy RNS modular multiplier for elliptic-curve cryptography
    Asif, Shahzad
    Andersson, Oskar
    Rodrigues, Joachim
    Kong, Yinan
    [J]. IET COMPUTERS AND DIGITAL TECHNIQUES, 2018, 12 (02): : 62 - 67
  • [35] Issues in Elliptic Curve Cryptography Implementation
    Paryasto, Marisa W.
    Kuspriyanto
    Sutikno, Sarwono
    Sasongko, Arif
    [J]. INTERNETWORKING INDONESIA, 2009, 1 (01): : 29 - 33
  • [36] Elliptic Curve Cryptography in Java']Java
    Deligiannidis, Leonidas
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2015, : 193 - 193
  • [37] Design of elliptic curve cryptography in GSI
    Zhu, YQ
    Lin, X
    Wang, G
    [J]. CURRENT TRENDS IN HIGH PERFORMANCE COMPUTING AND ITS APPLICATIONS, PROCEEDINGS, 2005, : 623 - 628
  • [38] Hyper-and-elliptic-curve cryptography
    Bernstein, Daniel J.
    Lange, Tanja
    [J]. LMS JOURNAL OF COMPUTATION AND MATHEMATICS, 2014, 17 : 181 - 202
  • [39] Analysis of Elliptic Curve Cryptography & RSA
    Khan, Mohammad Rafeek
    Upreti, Kamal
    Alam, Mohammad Imran
    Khan, Haneef
    Siddiqui, Shams Tabrez
    Haque, Mustafizul
    Parashar, Jyoti
    [J]. Journal of ICT Standardization, 2023, 11 (04): : 355 - 378
  • [40] PARTIAL SIGNCRYPTION ELLIPTIC CURVE CRYPTOGRAPHY
    Elkamchouchi, Hassan M.
    Elhamshary, Amira S.
    [J]. 2011 3RD INTERNATIONAL CONFERENCE ON COMPUTER TECHNOLOGY AND DEVELOPMENT (ICCTD 2011), VOL 3, 2012, : 641 - 647