DOI: 10.47749/t/unicamp.2018.1062516
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Curve25519 implementation for ARM microcontrollers

Abstract: To my supervisor, Diego, whose patience and dedication in sharing experience and knowledge pointed me in the directions leading up to this work.To my parents, Américo and Paweena, to the inspiration to push even more the borders of human knowledge.To Renna, my eternal girlfriend (soon to be wife) supporting me, either by understanding the lack of my presence at home or abdications needed for further improve our lifes.To the Laboratory of Security and Applied Cryptography (LASCA), in which infrastructure and wo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 32 publications
0
3
0
Order By: Relevance
“…Fast X25519 on the Cortex-M4. Multiple earlier papers describe optimized implementations of X25519 on the Arm Cortex-M4 [FA19,FA18]. One of the fastest implementations is by Haase and Labrique [HL19]; which needs only 625 358 cycles for one scalar multiplication on an STM32F407 running at 16 MHz.…”
Section: The Arm Cortex-m4 Microcontrollermentioning
confidence: 99%
“…Fast X25519 on the Cortex-M4. Multiple earlier papers describe optimized implementations of X25519 on the Arm Cortex-M4 [FA19,FA18]. One of the fastest implementations is by Haase and Labrique [HL19]; which needs only 625 358 cycles for one scalar multiplication on an STM32F407 running at 16 MHz.…”
Section: The Arm Cortex-m4 Microcontrollermentioning
confidence: 99%
“…However, the previous works avoided undisclosed data-dependent branches as well as secretly indexed the memory access to safeguard against timing attacks but could not fully counter side channel and horizontal attacks. [56] also implemented curve25519 targeted for ARM Cortex-M4 microcontroller using ECC based a digital signature (qDSA). [27] proposed mutual authentication scheme between a user, device and a gateway.…”
Section: ) Elliptic Curve Based Lightweight Cryptography In Resource ...mentioning
confidence: 99%
“…One function we added was fe25519 mul u32 asm, used for multiplication with small constants. It was based on Fujii's code [25,Listing 3.2], which was in turn based on [43].…”
Section: Arm Cortex M4mentioning
confidence: 99%