Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Journal articles
  4. Efficient and side-channel-aware implementations of elliptic curve cryptosystems over prime fields
 
research article

Efficient and side-channel-aware implementations of elliptic curve cryptosystems over prime fields

Karakoyunlu, Deniz
•
Gurkaynak, Frank Kagan
•
Sunar, Berk
Show more
2010
IET Information Security

Elliptic curve cryptosystems (ECCs) are utilised as an alternative to traditional public-key cryptosystems, and are more suitable for resource-limited environments because of smaller parameter size. In this study, the authors carry out a thorough investigation of side-channel attack aware ECC implementations over finite fields of prime characteristic including the recently introduced Edwards formulation of elliptic curves. The Edwards formulation of elliptic curves is promising in performance with built-in resiliency against simple side-channel attacks. To our knowledge the authors present the first hardware implementation for the Edwards formulation of elliptic curves. The authors also propose a technique to apply non-adjacent form (NAF) scalar multiplication algorithm with side-channel security using the Edwards formulation. In addition, the authors implement Joye's highly regular add-always scalar multiplication algorithm both with the Weierstrass and Edwards formulation of elliptic curves. Our results show that the Edwards formulation allows increased area-time performance with projective coordinates. However, the Weierstrass formulation with affine coordinates results in the simplest architecture, and therefore has the best area-time performance as long as an efficient modular divider is available.

  • Details
  • Metrics
Type
research article
DOI
10.1049/iet-ifs.2009.0038
Web of Science ID

WOS:000295121800004

Author(s)
Karakoyunlu, Deniz
Gurkaynak, Frank Kagan
Sunar, Berk
Leblebici, Yusuf  
Date Issued

2010

Published in
IET Information Security
Volume

4

Issue

1

Start page

30

End page

43

Subjects

Cryptographic Processor

•

Power Analysis

•

Multiplication

•

Attacks

•

Gf(P)

•

Algorithms

•

Resistance

•

Rsa

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
LSM  
Available on Infoscience
April 7, 2011
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/66039
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés