Lightweight implementation of Elliptic Curve Cryptography on FPGA has been a popular research topic due to the boom of ubiquitous computing. In this paper we propose a novel single instruction basedâ€¦ (More)

Horizontal collision correlation analysis (HCCA) imposes a serious threat to simple power analysis resistant elliptic curve cryptosystems involving unified algorithms, for e.g. Edward curve unifiedâ€¦ (More)

Y. Tanaka,1 K. Nakayama,1 S. Souma,2 T. Sato,1 N. Xu,3 P. Zhang,3 P. Richard,3 H. Ding,3 Y. Suzuki,4,5 P. Das,4,5 K. Kadowaki,4,5 and T. Takahashi1,2 1Department of Physics, Tohoku University, Sendaiâ€¦ (More)

Consider the equation dx dt + Q(t)G(x(tâˆ’ Ïƒ(t))) = f(t) (âˆ—) where f, Ïƒ, Q âˆˆ C([0,âˆž), [0,âˆž)), G âˆˆ C(R, R),G(âˆ’x) = âˆ’G(x), xG(x) > o for x 6= 0, G is non-decreasing, t > Ïƒ(t), Ïƒ(t) is decreasing and t âˆ’â€¦ (More)

We show that under certain restrictions the following three conditions are equivalent: The equation yâ€²â€²â€² + a(t)yâ€²â€² + b(t)yâ€² + c(t)y = f(t) is oscillatory. The equation xâ€²â€²â€² + a(t)xâ€²â€² + b(t)xâ€² + c(t)xâ€¦ (More)

Elliptic curve cryptosystems are built on an underlying additive group, with an addition operation defined as the group operation. The aim of the elliptic curve addition operation is to render anâ€¦ (More)

The Big Mac attack showed that an RSA implementation, protected with conventional side-channel countermeasures can be exploited on the basis of an operand sharing property of field multiplicationsâ€¦ (More)