Energy-Adaptive Dual-Field Processor for High-Performance Elliptic Curve Cryptographic Applications

@article{Lai2011EnergyAdaptiveDP,
  title={Energy-Adaptive Dual-Field Processor for High-Performance Elliptic Curve Cryptographic Applications},
  author={Jyu-Yuan Lai and Chih-Tsun Huang},
  journal={IEEE Transactions on Very Large Scale Integration (VLSI) Systems},
  year={2011},
  volume={19},
  pages={1512-1517}
}
We present an elliptic curve cryptographic (ECC) processor, capable of parallel and serial operation modes, with the unified architecture for both prime field and binary field cryptosystems, featuring comprehensive cryptographic functions to fulfill realistic security applications. An advanced field inversion method and the scheduler-controlled datapath are integrated into the processor to provide high-throughput and energy-adaptive security computing with power-performance trade off. Using 130… CONTINUE READING
Highly Cited
This paper has 31 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 22 extracted citations

FPGA based unified architecture for public key and private key cryptosystems

Frontiers of Computer Science • 2013
View 5 Excerpts
Highly Influenced

A 65nm ASIC based 256 NIST prime field ECC processor

2016 IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS) • 2016
View 4 Excerpts
Highly Influenced

High speed hardware implementation of an elliptic curve cryptography (ECC) co-processor

Trendz in Information Sciences & Computing(TISC2010) • 2010
View 5 Excerpts
Highly Influenced

A High-Throughput Processor for Dual-Field Elliptic Curve Cryptography with Power Analysis Resistance

2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom) • 2015
View 3 Excerpts
Highly Influenced

Processor with side-channel attack resistance

2013 IEEE International Solid-State Circuits Conference Digest of Technical Papers • 2013
View 4 Excerpts
Highly Influenced

Fast, Secure and Efficient Vedic Approach for Cryptographic implementations on FPGA

2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA) • 2018

High-Performance, Cost-Effective 3D Stacked Wide-Operand Adders

IEEE Transactions on Emerging Topics in Computing • 2017
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-10 of 17 references

High-Performance Architecture of Elliptic Curve Scalar Multiplication

IEEE Transactions on Computers • 2008
View 7 Excerpts
Highly Influenced

An FPGA arithmetic logic unit for computing scalar multiplication using the half-and-add method

2005 International Conference on Reconfigurable Computing and FPGAs (ReConFig'05) • 2005
View 6 Excerpts
Highly Influenced

A Highly Efficient Cipher Processor for Dual-Field Elliptic Curve Cryptography

IEEE Transactions on Circuits and Systems II: Express Briefs • 2009
View 12 Excerpts

Design of Scalable Hardware Architecture for Dual-field Montgomery Modular Inverse Computation

2009 Pacific-Asia Conference on Circuits, Communications and Systems • 2009

Scalable Hardware Architecture for Montgomery Inversion Computation in Dual-Field

2009 WASE International Conference on Information Engineering • 2009
View 3 Excerpts

CIC referenced flow for cellbased IC design

Chip Implementation Center, Taiwan
Doc. No. CIC-DSD-RD-08-01, CIC, May 2008. • 2008
View 2 Excerpts

Similar Papers

Loading similar papers…