Parallel memory architecture for elliptic curve cryptography over GF(p) aimed at efficient FPGA implementation

被引:0
作者
Laue, Ralf [1 ]
Huss, Sorin A. [1 ]
机构
[1] Tech Univ Darmstadt, Dept Comp Sci, Integrated Circuits & Syst Lab, Darmstadt, Germany
来源
JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY | 2008年 / 51卷 / 01期
关键词
elliptic curve cryptography; parallelization; memory architecture; FPGA;
D O I
10.1007/s11265-007-0135-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Parallelization of operations is of utmost importance for efficient implementation of Public Key Cryptography algorithms. Starting with a classification of parallelization methods at different abstraction levels of public key algorithms, we propose a novel memory architecture for elliptic curve implementations with multiple modular multiplier units. This architecture is well-suited for different point addition and doubling algorithms over GF(p) to be implemented on FPGAs. It allows the execution time to scale with the number of modular multipliers and exhibits nearly no overhead compared to the mere runtime of the multipliers. The advantages of this distributed memory architecture are demonstrated by means of two different point addition and doubling algorithms.
引用
收藏
页码:39 / 55
页数:17
相关论文
共 38 条
[1]  
ALEXANDRE F, 2003, IEEE T COMPUT, V52, P1215
[2]  
[Anonymous], 2000, 1363 IEEE
[3]  
[Anonymous], P 2002 INT PAR DISTR
[4]  
AOKI K, 2001, LECT NOTES COMPUT SC, V220, P235
[5]  
*ATMEL, 2004, AT40505102040AL
[6]   A full RNS implementation of RSA [J].
Bajard, JC ;
Imbert, L .
IEEE TRANSACTIONS ON COMPUTERS, 2004, 53 (06) :769-774
[7]   Finding optimum parallel coprocessor design for genus 2 HyperElliptic Curve Cryptosystems [J].
Bertoni, G ;
Breveglieri, L ;
Wollinger, T ;
Paar, C .
ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, :538-544
[8]  
BLUMEL R, 2005, ECRYPT WORKSH CRYPT
[9]  
Chae Hoon Lim, 1994, Advances in Cryptology - CRYPTO '94. 14th Annual International Cryptology Conference. Proceedings, P95
[10]  
Ciet M, 2003, PROCEEDINGS OF THE 46TH IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS & SYSTEMS, VOLS 1-3, P806