{"title":"二元Edwards曲线的高速标量乘法器","authors":"A. Fournaris, N. Sklavos, C. Koulamas","doi":"10.1145/2858930.2858938","DOIUrl":null,"url":null,"abstract":"Binary Edwards Curves (BEC) constitute an exciting elliptic curve variation that has very interesting benefits when it comes to side channel attack resistance. However, BECs require more GF(2k) operations for a single scalar multiplication and this acts as a deterring factor for their wide adoption and standardization. In this paper, a high speed BEC scalar multiplication architecture and implementation is proposed based on a parallel design strategy of the GF(2k) operations that provides power analysis attack resistance against a variety of attacks.","PeriodicalId":104042,"journal":{"name":"Proceedings of the Third Workshop on Cryptography and Security in Computing Systems","volume":"35 6","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"A High Speed Scalar Multiplier for Binary Edwards Curves\",\"authors\":\"A. Fournaris, N. Sklavos, C. Koulamas\",\"doi\":\"10.1145/2858930.2858938\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Binary Edwards Curves (BEC) constitute an exciting elliptic curve variation that has very interesting benefits when it comes to side channel attack resistance. However, BECs require more GF(2k) operations for a single scalar multiplication and this acts as a deterring factor for their wide adoption and standardization. In this paper, a high speed BEC scalar multiplication architecture and implementation is proposed based on a parallel design strategy of the GF(2k) operations that provides power analysis attack resistance against a variety of attacks.\",\"PeriodicalId\":104042,\"journal\":{\"name\":\"Proceedings of the Third Workshop on Cryptography and Security in Computing Systems\",\"volume\":\"35 6\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-01-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the Third Workshop on Cryptography and Security in Computing Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2858930.2858938\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Third Workshop on Cryptography and Security in Computing Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2858930.2858938","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A High Speed Scalar Multiplier for Binary Edwards Curves
Binary Edwards Curves (BEC) constitute an exciting elliptic curve variation that has very interesting benefits when it comes to side channel attack resistance. However, BECs require more GF(2k) operations for a single scalar multiplication and this acts as a deterring factor for their wide adoption and standardization. In this paper, a high speed BEC scalar multiplication architecture and implementation is proposed based on a parallel design strategy of the GF(2k) operations that provides power analysis attack resistance against a variety of attacks.