Marisa W. Paryasto

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Due to the continuous advancement in technology, mobile devices are playing important role in everyone's day to day life. Everyone is moving towards wireless mobile systems, but power consumption is an important concern in such devices. While designing, a lot of care has to be taken especially in power optimization because there is no regular power supply(More)
The theory of finite fields has important applications in coding theory and cryptography. Two type of basis of finite field € GF (2 n) over € GF (2) are of particular interest, polynomial basis and optimal normal basis (type I and II) of the form € β, β € α , € β in. Choosing between optimal normal basis and polinomial basis depends on the application. This(More)
Implementing a secure cryptosystem requires operations involving hundreds of bits. One of the most recommended algorithm is Elliptic Curve Cryptography (ECC). The complexity of elliptic curve algorithms and parameters with hundreds of bits requires specific design and implementation strategy. The design architecture must be customized according to security(More)
  • 1