Design and Analysis of Pairing Based Cryptographic Hardware for Prime Fields

被引:0
|
作者
Ghosh, Santosh [1 ]
机构
[1] IIT Kharagpur, Dept Comp Sci & Engn, Kharagpur 721302, W Bengal, India
来源
2011 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI) | 2011年
关键词
D O I
10.1109/ISVLSI.2011.39
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This work deals with the design and implementation of pairing based cryptographic hardware and its security analysis against side-channel and fault attacks.
引用
收藏
页码:363 / 364
页数:2
相关论文
共 50 条
  • [21] Timing Analysis in Software and Hardware to Implement NIST Elliptic Curves over Prime Fields
    Ding, Qian
    Reece, Trey
    Robinson, William H.
    2013 IEEE 56TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2013, : 1358 - 1362
  • [22] Agent Protection based on the use of cryptographic hardware
    Munoz, Antonio
    Mana, Antonio
    Harjani, Rajesh
    Montenegro, Marioli
    2009 IEEE 33RD INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOLS 1 AND 2, 2009, : 985 - 990
  • [23] A solution based on cryptographic hardware to protect agents
    Muñoz, Antonio
    Maña, Antonio
    Antón, Pablo
    Proceedings - 13th International Conference on Network-Based Information Systems, NBiS 2010, 2010, : 400 - 407
  • [24] Fault-based Attacks on Cryptographic Hardware
    Polian, Ilia
    Kreuzer, Martin
    PROCEEDINGS OF THE 2013 IEEE 16TH INTERNATIONAL SYMPOSIUM ON DESIGN AND DIAGNOSTICS OF ELECTRONIC CIRCUITS & SYSTEMS (DDECS), 2013, : 12 - 17
  • [25] Evolutionary RSA-based cryptographic hardware using the co-design methodology
    Nedjah, N
    Mourelle, LD
    INNOVATIONS IN APPLIED ARTIFICIAL INTELLIGENCE, 2004, 3029 : 351 - 360
  • [26] Designing a Code Generator for Pairing Based Cryptographic Functions
    Perez, Luis J. Dominguez
    Scott, Michael
    PAIRING-BASED CRYPTOGRAPHY-PAIRING 2010, 2010, 6487 : 207 - 224
  • [27] An efficient hardware implementation of the elliptic curve cryptographic processor over prime field, Fp
    Kudithi, Thirumalesu
    Sakthivel, R.
    INTERNATIONAL JOURNAL OF CIRCUIT THEORY AND APPLICATIONS, 2020, 48 (08) : 1256 - 1273
  • [28] Hardware Trojan Design and Its Detection using Side-Channel Analysis on Cryptographic Hardware AES Implemented on FPGA
    Hanindhito, Bagus
    Kurniawan, Yusuf
    PROCEEDING OF 2019 INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATICS (ICEEI), 2019, : 191 - 196
  • [29] Research on Power Analysis Against Software-based and Hardware-based Cryptographic Circuits
    Sun, Wei
    Liu, Jun-Rong
    Gu, Da-Wu
    Guo, Zheng
    Xie, Jun
    Ma, Bo
    INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 10 - 18
  • [30] Efficient cryptographic hardware using the co-design methodology
    Mourelle, LD
    Nedjah, N
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 508 - 512