Systematic Synthesis of Elliptic Curve Cryptography Implementations


The cryptographic code that runs the Internet is subject to intense manual optimization by elite programmers. Most of the complexity of the optimized code comes from manipulation of integers too large to fit in hardware registers. Perhaps surprisingly, for a change as innocuous as changing an algorithmic parameter to a different prime number, significant… (More)


7 Figures and Tables

Slides referencing similar topics