N. Alimi, Anissa Sghaier, Mohsen Machhout, R. Tourki
{"title":"探索曲线型密码加速器的设计空间","authors":"N. Alimi, Anissa Sghaier, Mohsen Machhout, R. Tourki","doi":"10.1109/ICEMIS.2017.8273045","DOIUrl":null,"url":null,"abstract":"Due to its shortest key-length, Hyperelliptic Curve Cryptography (HECC) is considered as a promising Public Key Cryptography solution for securing future resource-constrained embedded systems. However, its mathematical complexity, compared to the Elliptic Curve Cryptography (ECC), is slowing down its standardization. In this paper, we try to fairly explore different hardware architectures of ECC and HECC under the same level of security through parallelizing modular arithmetic layer operations. Speed and cost results of the implemented curve-based cryptographic accelerators showed that without specific optimization, ECC still outperform HECC.","PeriodicalId":117908,"journal":{"name":"2017 International Conference on Engineering & MIS (ICEMIS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Exploring the design space of curve-based cryptographic accelerators\",\"authors\":\"N. Alimi, Anissa Sghaier, Mohsen Machhout, R. Tourki\",\"doi\":\"10.1109/ICEMIS.2017.8273045\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Due to its shortest key-length, Hyperelliptic Curve Cryptography (HECC) is considered as a promising Public Key Cryptography solution for securing future resource-constrained embedded systems. However, its mathematical complexity, compared to the Elliptic Curve Cryptography (ECC), is slowing down its standardization. In this paper, we try to fairly explore different hardware architectures of ECC and HECC under the same level of security through parallelizing modular arithmetic layer operations. Speed and cost results of the implemented curve-based cryptographic accelerators showed that without specific optimization, ECC still outperform HECC.\",\"PeriodicalId\":117908,\"journal\":{\"name\":\"2017 International Conference on Engineering & MIS (ICEMIS)\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Engineering & MIS (ICEMIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICEMIS.2017.8273045\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Engineering & MIS (ICEMIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEMIS.2017.8273045","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Exploring the design space of curve-based cryptographic accelerators
Due to its shortest key-length, Hyperelliptic Curve Cryptography (HECC) is considered as a promising Public Key Cryptography solution for securing future resource-constrained embedded systems. However, its mathematical complexity, compared to the Elliptic Curve Cryptography (ECC), is slowing down its standardization. In this paper, we try to fairly explore different hardware architectures of ECC and HECC under the same level of security through parallelizing modular arithmetic layer operations. Speed and cost results of the implemented curve-based cryptographic accelerators showed that without specific optimization, ECC still outperform HECC.