Fast multi-precision multiplication for public-key cryptography on embedded microprocessors
From MaRDI portal
Publication:3172985
Recommendations
- Fast multi-precision multiplication for public-key cryptography on embedded microprocessors
- Fast multi-precision multiplication for public-key cryptography on embedded microprocessors
- New speed records for Montgomery modular multiplication on 8-bit AVR microcontrollers
- scientific article; zbMATH DE number 2085209
- A high-speed elliptic curve cryptographic processor for generic curves over \(\mathrm{GF}(p)\)
Cited in
(17)- Fast multi-precision multiplication for public-key cryptography on embedded microprocessors
- Fast multi-precision multiplication for public-key cryptography on embedded microprocessors
- Multi-precision squaring for public-key cryptography on embedded microprocessors
- Curve448 on 32-bit ARM Cortex-M4
- scientific article; zbMATH DE number 1341879 (Why is no real title available?)
- SIKE round 2 speed record on ARM Cortex-M4
- Faster multiplication in \(\mathbb{Z}_{2^m}[x]\) on Cortex-M4 to speed up NIST PQC candidates
- Applied Cryptography and Network Security
- Compact implementation of modular multiplication for special modulus on MSP430X
- High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers
- New speed records for Montgomery modular multiplication on 8-bit AVR microcontrollers
- How to (pre-)compute a ladder -- improving the performance of X25519 and X448
- Full-size high-security ECC implementation on MSP430 microcontrollers
- On the worst-case side-channel security of ECC point randomization in embedded devices
- Low-weight primes for lightweight elliptic curve cryptography on 8-bit AVR processors
- Time-efficient finite field microarchitecture design for Curve448 and Ed448 on Cortex-M4
- scientific article; zbMATH DE number 1504800 (Why is no real title available?)
This page was built for publication: Fast multi-precision multiplication for public-key cryptography on embedded microprocessors
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3172985)