期刊文献+

一种用于RFID的基于广义二进制Hessian曲线的密码处理器的实现

Efficient Implementation of Generalized Binary Hessian Curve Based Processor for RFID
下载PDF
导出
摘要 针对射频识别(RFID)芯片面积和能量资源极其有限的特点,设计实现了一种基于广义二进制Hessian曲线(GBHC)的椭圆曲线密码(ECC)处理器。在算法上采用Montgomery Ladder点乘算法和w坐标法,以优化加速运算时序,在结构上精细设计循环移位寄存器组和门控时钟,以降低面积和能量消耗。实验表明,在保证安全精度不变的情况下,所实现的密码处理器具有较快的运算速度、极小的芯片面积和超低的能量消耗,并能抵抗简单功耗分析(SPA)等侧信道攻击(SCA)。 Radio frequency identification (RFID) suffers extremely limited chip area and energy resource. A novel elliptic curve cryptographic (ECC) processer based on generalized binary Hessian curve (GBHC) is designed and implemented. The authors employ Montgomery Ladder scalar-multiplication algorithm and optimized w-coordinate method for accelerating the computing timing, and well-design circular shift register (CSR) architecture and clock gating technology for reducing the consumption of area and energy. The results show that the proposed processer has fast computing speed, minimal chip area and ultra-low energy consumption, and is capable to resist some types of side channel attack (SCA) such as simple power analysis (SPA).
出处 《北京大学学报(自然科学版)》 EI CAS CSCD 北大核心 2014年第4期657-663,共7页 Acta Scientiarum Naturalium Universitatis Pekinensis
关键词 射频识别 广义二进制Hessian曲线 椭圆曲线密码处理器 低能量消耗 RFID generalized binary Hessian curve elliptic curve cryptography low power
  • 相关文献

参考文献13

  • 1Finkenzeller K.RFID handbook:fundamentals and applications in contactless smart cards,radio frequency identification and near-field communi-cation.3rd Edition.New Jersey:Wiley,2010.
  • 2Hein D,Wolkerstorfer J,Felber N.ECC is ready for RFID-a proof in silicon//Proceedings of 15th International Workshop on Selected Areas in Cryptography.New Brunswick,2008:401-413.
  • 3Koblitz N,Menezes A,Vanstone S.The state of elliptic curve cryptography.Designs,Codes and Cryptography,2000,19:173-193.
  • 4Hankerson D,Vanstone S,Menezes A J.Guide to elliptic curve cryptography.New York:Springer-Verlag,2004.
  • 5Bernstein D J,Lange T.Faster addition and doubling on elliptic curves//Proceedings of 13th International Conference on the Theory and Application of Cryptology and Information Security.Kuching,2007:29-50.
  • 6Bemstein D J,Lange T,Farashahi R R.Binary edwards curves//Proceedings of 10th International Workshop on Cryptographic Hardware and Embedded Systems.Washington,2008:244-265.
  • 7Farashahi R R,Joye M.Efficient arithmetic on hessian curves//Proceedings of 13th International Conference on Practice and Theory in Public Key Cryptography.Paris,2010:243-260.
  • 8Azarderakhsh R,Reyhani-Masoleh A.Efficient FPGA implementations of point multiplication on binary edwards and generalized Hessian curves using gaussian normal basis.IEEE Transactions on Very Large Scale Integration(VLSI)Systems,2012,20(8):1453-1466.
  • 9Joye M,Yen S M.The montgomery powering ladder//Proceedings of 4th International Workshop Redwood Shores on Cryptographic Hardware and Embedded Systems.California,2002:291-302.
  • 10Kocabas U,Fan J F,Verbauwhede I.Implementation of binary edwards curves for very-constrained devices//Proceedings of 21st IEEE International Conference on Application-specific Systems Architectures and Processors(ASAP).Rennes,2010:185-191.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部