Four (mathbbQ) on embedded devices with strong countermeasures against side-channel attacks
DOI10.1007/978-3-319-66787-4_32zbMATH Open1446.94151OpenAlexW3038910276MaRDI QIDQ5114656FDOQ5114656
Authors: Zhe Liu, Patrick Longa, Geovandro C. C. F. Pereira, Oscar Reparaz, Hwajeong Seo
Publication date: 24 June 2020
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-66787-4_32
Recommendations
- Four\(\mathbb {Q}\) on FPGA: new hardware speed records for elliptic curve cryptography over large prime characteristic fields
- Four\(\mathbb {Q}\)NEON: faster elliptic curve scalar multiplications on ARM processors
- High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers
- Faster compact Diffie-Hellman: endomorphisms on the \(x\)-line
- Curve25519 for the Cortex-M4 and beyond
elliptic curvesenergy efficiencyside-channel attacksIoTembedded devicesECDHFour\(\mathbb Q\)strong countermeasures
Cited In (9)
- Curve448 on 32-bit ARM Cortex-M4
- High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers
- EPG-representations with Small Grid-Size
- SIKE round 2 speed record on ARM Cortex-M4
- Curve25519 for the Cortex-M4 and beyond
- 2DT-GLS: faster and exception-free scalar multiplication in the GLS254 binary curve
- Four\(\mathbb {Q}\) on FPGA: new hardware speed records for elliptic curve cryptography over large prime characteristic fields
- Four\(\mathbb {Q}\)NEON: faster elliptic curve scalar multiplications on ARM processors
- Time-efficient finite field microarchitecture design for Curve448 and Ed448 on Cortex-M4
Uses Software
This page was built for publication: Four (mathbbQ) on embedded devices with strong countermeasures against side-channel attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5114656)