Sciweavers

107 search results - page 7 / 22
» Software Implementations of Elliptic Curve Cryptography
Sort
View
ISCAS
2006
IEEE
76views Hardware» more  ISCAS 2006»
14 years 2 months ago
Flexible hardware architectures for curve-based cryptography
— This paper compares implementations of elliptic and hyperelliptic curve cryptography (ECC and HECC) on an FPGA platform. We use the same low-level blocks to implement the basic...
Lejla Batina, Nele Mentens, Bart Preneel, Ingrid V...
CTRSA
2001
Springer
121views Cryptology» more  CTRSA 2001»
14 years 29 days ago
Software Implementation of the NIST Elliptic Curves Over Prime Fields
Michael Brown, Darrel Hankerson, Julio Lópe...
ISDA
2006
IEEE
14 years 2 months ago
Efficient Multiplier over Finite Field Represented in Type II Optimal Normal Basis
- Elliptic curve cryptography plays a crucial role in networking and information security area, and modular multiplication arithmetic over finite field is a necessary computation p...
Youbo Wang, Zhiguang Tian, Xinyan Bi, Zhendong Niu
SACRYPT
1999
Springer
14 years 21 days ago
Elliptic Curve Pseudorandom Sequence Generators
In this paper, we introduce a new approach to the generation of binary sequences by applying trace functions to elliptic curves over GF 2m. We call these sequences elliptic curve...
Guang Gong, Thomas A. Berson, Douglas R. Stinson