High-performance Implementation of Elliptic Curve Cryptography Using Vector Instructions

2019 ◽  
Vol 45 (3) ◽  
pp. 1-35 ◽  
Author(s):  
Armando Faz-Hernández ◽  
Julio López ◽  
Ricardo Dahab
2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Yong Xiao ◽  
Weibin Lin ◽  
Yun Zhao ◽  
Chao Cui ◽  
Ziwen Cai

Teleoperated robotic systems are those in which human operators control remote robots through a communication network. The deployment and integration of teleoperated robot’s systems in the medical operation have been hampered by many issues, such as safety concerns. Elliptic curve cryptography (ECC), an asymmetric cryptographic algorithm, is widely applied to practical applications because its far significantly reduced key length has the same level of security as RSA. The efficiency of ECC on GF (p) is dictated by two critical factors, namely, modular multiplication (MM) and point multiplication (PM) scheduling. In this paper, the high-performance ECC architecture of SM2 is presented. MM is composed of multiplication and modular reduction (MR) in the prime field. A two-stage modular reduction (TSMR) algorithm in the SCA-256 prime field is introduced to achieve low latency, which avoids more iterative subtraction operations than traditional algorithms. To cut down the run time, a schedule is put forward when exploiting the parallelism of multiplication and MR inside PM. Synthesized with a 0.13 um CMOS standard cell library, the proposed processor consumes 341.98k gate areas, and each PM takes 0.092 ms.


2013 ◽  
Vol 380-384 ◽  
pp. 2407-2410
Author(s):  
Xin Xu ◽  
Ping Zhu ◽  
Zheng Ping Jin ◽  
Hua Zhang

Recently, several protocols came into being successively to meet the requirement of efficient operations in low-power roaming environment with the fast advance of communication technologies. Unfortunately, these protocols are not a suitable candidate for special requirements in automobile roaming system such as low consumption, high performance and convenience since these protocols pay more attention to a common network environment. In this paper, we address the problem of mutual authentication and key agreement with user anonymity for an automobile roaming system. More specifically, we propose the protocol employs elliptic curve cryptography system to enhance operational efficiency and take into account common attacks and give corresponding resist measures to ensure security. The analysis shows our scheme is user friendly and secure.


2018 ◽  
Vol 75 (3) ◽  
pp. 1107-1122 ◽  
Author(s):  
Luis Parrilla ◽  
José A. Álvarez-Bermejo ◽  
Encarnación Castillo ◽  
Juan A. López-Ramos ◽  
Diego P. Morales-Santos ◽  
...  

2016 ◽  
Vol 11 (1) ◽  
pp. 33-42 ◽  
Author(s):  
Md Selim Hossain ◽  
Yinan Kong ◽  
Ehsan Saeedi ◽  
Niras C. Vayalil

Sign in / Sign up

Export Citation Format

Share Document