2017
DOI: 10.1142/s021812661750178x
|View full text |Cite
|
Sign up to set email alerts
|

Towards an Optimized Architecture for Unified Binary Huff Curves

Abstract: Applying uni¯ed formula while computing point addition and doubling provides immunity to Elliptic Curve Cryptography (ECC) against power analysis attacks (a type of side channel attack). One of the popular techniques providing this uni¯edness is the Binary Hu® Curves (BHC) which got attention in 2011. In this paper we are presenting highly optimized architectures to implement point multiplication (PM) on the standard NIST curves over GF ð2 163 Þ and GF ð2 233 Þ using BHC. To achieve a high throughput over area… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
58
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
7

Relationship

3
4

Authors

Journals

citations
Cited by 23 publications
(58 citation statements)
references
References 16 publications
0
58
0
Order By: Relevance
“…Previously, we have proposed a throughput/area processor for binary huff curves [21]. In this paper, we are targeting a pipelined architecture of ECC for those applications, where the throughput/ area is critical such as internet-based applications [16,17], cloud computing [18], and banking applications [19].…”
Section: Our Contributionsmentioning
confidence: 99%
“…Previously, we have proposed a throughput/area processor for binary huff curves [21]. In this paper, we are targeting a pipelined architecture of ECC for those applications, where the throughput/ area is critical such as internet-based applications [16,17], cloud computing [18], and banking applications [19].…”
Section: Our Contributionsmentioning
confidence: 99%
“…The aim in data clustering is to group spatial data or multidimensional attribute data into several collections of clusters, and make the gap between different clusters as large as possible. In contrast, the differences between elements within the same class must be as small as possible [45]. The commonly used clustering algorithms include DBSCAN clustering algorithm and K-means clustering algorithm.…”
Section: Market Segmentation By Cluster Analysismentioning
confidence: 99%
“…The performance of the entire crypto architecture is mainly depends upon its FF multiplier and inversion [17]. In recent research practices, the most commonly implemented multipliers are bit parallel [12], [17]- [19] and digit serial [10] and [20].…”
Section: Introductionmentioning
confidence: 99%
“…The performance of the entire crypto architecture is mainly depends upon its FF multiplier and inversion [17]. In recent research practices, the most commonly implemented multipliers are bit parallel [12], [17]- [19] and digit serial [10] and [20]. The bit parallel multipliers are used to achieve higher performances [18] whereas digit serial multipliers are used to achieve optimal throughput/area designs [20].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation