期刊文献+

基于专用指令集的椭圆曲线密码协处理器

Elliptic Curve Cryptography Coprocessor Based on Specific Instruction Set
下载PDF
导出
摘要 在分析各种椭圆曲线密码(ECC)算法结构特点的基础上,提取不同算法的典型操作,研究算法操作间的并行性,提出两路模乘与两路模加减实现ECC算法的方案。给出一种基于超长指令字结构的专用指令集密码协处理器的设计方案,并进行指令结构的并行化设计。实验结果显示,该设计能够达到ECC运算处理高效性与灵活性的折中。 Based on analyzing the structure character of Elliptic Curve Cryptography(ECC) algorithms, the representative operation is selected. This paper has a research on the parallelism among the operation. A solution for efficient cryptographic processing through two multiplication modules and two addition/subtraction modules are proposed. A Very Long Instruction Word(VLIW) architecture of ECC coprocessor with specific instruction set is also presented. Experimental result shows that this co-processor has tradeoff between high performance and flexibility.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第3期111-113,共3页 Computer Engineering
基金 国家"863"计划基金资助项目(2008AA01Z103)
关键词 椭圆曲线密码 专用指令集 超长指令字结构 Elliptic Curve Cryptography(ECC) specific instruction set Very Long Instruction Word(VLIW) architecture
  • 相关文献

参考文献5

  • 1Keutzer K,Malik S,Newton A R.From ASIC to ASIP-The Next Design Discontinuity[C]//Proc.of IEEE International Conference on Computer Design.[S.l.]:IEEE Computer Science Press,2002:84-90.
  • 2仲先海,徐金甫,严迎建.并行可配置ECC专用指令协处理器[J].计算机工程,2009,35(5):153-155. 被引量:2
  • 3Cohen H,Miyaji A,Ono T.Efficient Elliptic Curve Exponentiation Using Mixed Coordinates[C]//Proc.of the International Conference on the Theory and Applications of Cryptology and Information Security.London,UK:Springer-Verlag,1998:51-65.
  • 4Lai Jyu-Yuan,Huang Chih-Tsun.Elixir:High-throughput Costeffective Deal-field Processors and the Design Framework for Elliptic Curve Cryptography[J].IEEE Trans.on Very Large Scale Integration Systems,2008,16(11):1567-1580.
  • 5Sakiyama K,Mulder E D,Preneel B,et al.A Parallel Processing Hardware Architecture for Elliptic Curve Cryptosystems[C]//Proc.of the International Conference on Acoustics,Speech and Signal Processing.Toulouse,France:[s.n.],2006:904-907.

二级参考文献4

  • 1Satoh A, Takano K. A Scalable Dual-field Elliptic Curve Cryptographic Processor[J]. IEEE Transactions on Computers, 2003, 52(4): 449-460.
  • 2Goubin L. A Refined Power Analysis Attack on Elliptic Curve Cryptosystems[C]//Proc. of PKC'03. Miami, Florida, USA: Springer-Verlag, 2003:199-210.
  • 3Gaisler J. The LEON2 Processor User's Manual[Z]. (2005-07-10). http://www.gaisler.com.
  • 4Tenca A E Savas E, Koc C K. A Design Framework for Scalable and Unified Multipliers in GF(p) and GF(2^m)[J]. International Journal of Computer Research, 2004, 13(1 ): 68-83.

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部