N. Alimi, Anissa Sghaier, Mohsen Machhout, R. Tourki
{"title":"Exploring the design space of curve-based cryptographic accelerators","authors":"N. Alimi, Anissa Sghaier, Mohsen Machhout, R. Tourki","doi":"10.1109/ICEMIS.2017.8273045","DOIUrl":null,"url":null,"abstract":"Due to its shortest key-length, Hyperelliptic Curve Cryptography (HECC) is considered as a promising Public Key Cryptography solution for securing future resource-constrained embedded systems. However, its mathematical complexity, compared to the Elliptic Curve Cryptography (ECC), is slowing down its standardization. In this paper, we try to fairly explore different hardware architectures of ECC and HECC under the same level of security through parallelizing modular arithmetic layer operations. Speed and cost results of the implemented curve-based cryptographic accelerators showed that without specific optimization, ECC still outperform HECC.","PeriodicalId":117908,"journal":{"name":"2017 International Conference on Engineering & MIS (ICEMIS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Engineering & MIS (ICEMIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEMIS.2017.8273045","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Due to its shortest key-length, Hyperelliptic Curve Cryptography (HECC) is considered as a promising Public Key Cryptography solution for securing future resource-constrained embedded systems. However, its mathematical complexity, compared to the Elliptic Curve Cryptography (ECC), is slowing down its standardization. In this paper, we try to fairly explore different hardware architectures of ECC and HECC under the same level of security through parallelizing modular arithmetic layer operations. Speed and cost results of the implemented curve-based cryptographic accelerators showed that without specific optimization, ECC still outperform HECC.