Four (mathbbQ) on embedded devices with strong countermeasures against side-channel attacks
From MaRDI portal
Publication:5114656
Recommendations
- Four\(\mathbb {Q}\) on FPGA: new hardware speed records for elliptic curve cryptography over large prime characteristic fields
- Four\(\mathbb {Q}\)NEON: faster elliptic curve scalar multiplications on ARM processors
- High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers
- Faster compact Diffie-Hellman: endomorphisms on the \(x\)-line
- Curve25519 for the Cortex-M4 and beyond
Cited in
(9)- Time-efficient finite field microarchitecture design for Curve448 and Ed448 on Cortex-M4
- Curve448 on 32-bit ARM Cortex-M4
- High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers
- EPG-representations with Small Grid-Size
- SIKE round 2 speed record on ARM Cortex-M4
- Curve25519 for the Cortex-M4 and beyond
- 2DT-GLS: faster and exception-free scalar multiplication in the GLS254 binary curve
- Four\(\mathbb {Q}\) on FPGA: new hardware speed records for elliptic curve cryptography over large prime characteristic fields
- Four\(\mathbb {Q}\)NEON: faster elliptic curve scalar multiplications on ARM processors
This page was built for publication: Four (mathbbQ) on embedded devices with strong countermeasures against side-channel attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5114656)