SLIDE 13 References II
[8]
- N. Boullis and A. Tisserand.
Some optimizations of hardware multiplication by constant matrices. IEEE Transactions on Computers, 54(10):1271–1282, October 2005. [9]
- E. Brier, M. Joye, and I. Dechene.
Embedded Cryptographic Hardware, chapter Unified Point Addition Formulae for Elliptic Curve Cryptosystems, pages 247–256. Nova Science, 2004. [10]
- A. Byrne, E. Popovici, and W.P. Marnane.
Versatile processor for gf(pm) arithmetic for use in cryptographic applications. IET Computers & Digital Techniques, 2(4):253–264, July 2008. [11]
- T. Chabrier and A. Tisserand.
On-the-fly multi-base recoding for ECC scalar multiplication without pre-computations. In A. Nannarelli, P.-M. Seidel, and P. T. P. Tang, editors, Proc. 21st Symposium on Computer Arithmetic (ARITH), pages 219–228, Austin, TX, U.S.A, April 2013. IEEE Computer Society. [12]
- J. Chen, A. Tisserand, E. M. Popovici, and S. Cotofana.
Robust sub-powered asynchronous logic. In J. Becker and M. R. Adrover, editors, Proc. 24th International Workshop on Power and Timing Modeling, Optimization and Simulation (PATMOS), pages 1–7, Palma de Mallorca, Spain, September 2014. IEEE. [13]
- J. Chen, A. Tisserand, E. M. Popovici, and S. Cotofana.
Asynchronous charge sharing power consistent Montgomery multiplier. In J. Sparso and E Yahya, editors, Proc. 21st IEEE International Symposium on Asynchronous Circuits and Systems (ASYNC), pages 132–138, Mountain View, California, USA, May 2015. [14]
- V. Dimitrov, L. Imbert, and P. K. Mishra.
Efficient and secure elliptic curve point multiplication using double-base chains. In Proc. 11th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), volume 3788 of LNCS, pages 59–78, Chennai, India, December 2005. Springer. Arnaud Tisserand. CNRS – Lab-STICC. Arithmetic Tradeoffs for Hardware Asymmetric Cryptography 49/53
References III
[15]
- V. Dimitrov, L. Imbert, and P. K. Mishra.
The double-base number system and its application to elliptic curve cryptography. Mathematics of Computation, 77(262):1075–1104, April 2008. [16]
Extended double-base number system with applications to elliptic curve cryptography. In Proc. 7th International Conference on Progress in Cryptology (INDOCRYPT), volume 4329 of LNCS, pages 335–348, Kolkata, India, December 2006. Springer. [17]
- G. Gallin and A. Tisserand.
Hardware architectures for HECC. 15th International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi), June 2017. Smolenice, Slovakia. [18]
- P. Giorgi, L. Imbert, and T. Izard.
Optimizing elliptic curve scalar multiplication for small scalars. In Proc. Mathematics for Signal and Information Processing, volume 7444, pages 74440N:1–10, San Diego, CA, USA, September 2009. SPIE. [19]
- D. Hankerson, A. Menezes, and S. Vanstone.
Guide to Elliptic Curve Cryptography. Springer, 2004. [20]
- K. Itoh, M. Takenaka, N. Torii, S. Temma, and Y. Kurihara.
Fast implementation of public-key cryptography on a DSP TMS320C6201. In Proc. Cryptographic Hardware and Embedded Systems (CHES), volume 1717 of LNCS, pages 61–72, Worcester, MA, USA, August 1999. Springer. [21]
An algorithm for exact division. Journal of Symbolic Computation, 15(2):169–180, February 1993. Arnaud Tisserand. CNRS – Lab-STICC. Arithmetic Tradeoffs for Hardware Asymmetric Cryptography 50/53
References IV
[22]
Setting speed records with the (fractional) multibase non-adjacent form method for efficient elliptic curve scalar multiplication. Technical Report 118, Cryptology ePrint Archive, 2008. [23]
Fast multibase methods and other several optimizations for elliptic curve scalar multiplication. In Proc. Public Key Cryptography (PKC), volume 5443 of LNCS, pages 443–462, 2009. [24]
New multibase non-adjacent form scalar multiplication and its application to elliptic curve cryptosystems. Technical Report 52, Cryptology ePrint Archive, 2008. [25]
- Y. Ma, Z. Liu, W. Pan, and J. Jing.
A high-speed elliptic curve cryptographic processor for generic curves over GF(p). In Proc. 20th International Workshop on Selected Areas in Cryptography (SAC), volume 8282 of LNCS, pages 421–437, Burnaby, BC, Canada, August 2013. Springer. [26]
- S. Mangard, E. Oswald, and T. Popp.
Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer, 2007. [27]
New point addition formulae for ECC applications. In Proc. 1st International Workshop on Arithmetic of Finite Fields (WAIFI), volume 4547 of LNCS, pages 189–201, Madrid, Spain, June 2007. Springer. [28]
Speeding the pollar and elliptic curves methods of factorisation. Mathematics of Computation, 48(177):243–264, January 1987. [29]
Arithmetic Operators on GF(2m) for Cryptographic Applications: Performance - Power Consumption - Security Tradeoffs. Phd thesis, University of Rennes 1 and Silesian University of Technology, December 2012. Arnaud Tisserand. CNRS – Lab-STICC. Arithmetic Tradeoffs for Hardware Asymmetric Cryptography 51/53
References V
[30]
- D. Pamula, E. Hrynkiewicz, and A. Tisserand.
Analysis of GF(2233) multipliers regarding elliptic curve cryptosystem applications. In 11th IFAC/IEEE International Conference on Programmable Devices and Embedded Systems (PDeS), pages 271–276, Brno, Czech Republic, May 2012. [31]
- D. Pamula and A. Tisserand.
GF(2m) finite-field multipliers with reduced activity variations. In 4th International Workshop on the Arithmetic of Finite Fields, volume 7369 of LNCS, pages 152–167, Bochum, Germany, July 2012. Springer. [32]
- D. Pamula and A. Tisserand.
Fast and secure finite field multipliers. In Proc. 18th Euromicro Conference on Digital System Design (DSD), pages 653–660, Madeira, Portugal, August 2015. [33]
Œuvres compl` etes, volume 5, chapter De Numeribus Multiplicibus, pages 117–128. Librarie Lef` evre, 1819. [34]
- J. Proy, N. Veyrat-Charvillon, A. Tisserand, and N. Meloni.
Full hardware implementation of short addition chains recoding for ECC scalar multiplication. In Actes Conf´ erence d’informatique en Parall´ elisme, Architecture et Syst` eme (ComPAS), Lille, France, June 2015. [35]
Elements of Automata Theory, chapter Prologue: M. Pascal’s Division Machine, pages 1–6. Cambridge, 2009. Arnaud Tisserand. CNRS – Lab-STICC. Arithmetic Tradeoffs for Hardware Asymmetric Cryptography 52/53