Learn More
This research paper aims at analyzing the impact of exploiting the parallelism available in two common Elliptic Curve Cryptography (ECC) projective forms on speed and cost factors, assuming point-multiplication is implemented using the m-ary algorithm instead of the popular binary algorithm. Point-multiplication is implemented using scalable multipliers in(More)
In system-level design using hardware-software co-design approaches, applications involved in embedded systems are usually represented as data flow diagrams (DFD) where nodes may either be implemented in software or in hardware, subject to cost-performance constraints. In our research paper, we present how genetic algorithms can be used in order to perform(More)
In this research paper, we aim at proposing a new energy-aware approach in order to authenticate packet flows in systems with limited energy. Reduction of power consumption is obtained by dynamically merging data packets and using lower message digests as a function of the system energy. This approach allows increasing the lifetime of battery-operated(More)
This paper presents two new multi-signature schemes which aim at providing data authenticity, integrity, and non-repudiation. The proposed signing/verifying schemes are extensions of standardized algorithms, such as DSA (Digital Signature Algorithm) and ECDSA (Elliptic Curve DSA) algorithms. These schemes are faster than repeated individual signature (RDSA)(More)