Skip to main content

and
  1. Chapter and Conference Paper

    Compact FPGA Implementations of the Five SHA-3 Finalists

    Allowing good performances on different platforms is an important criteria for the selection of the future sha-3 standard. In this paper, we consider the compact implementations of blake, Grøstl, jh, Keccak and S...

    Stéphanie Kerckhof, François Durvaux in Smart Card Research and Advanced Applicati… (2011)

  2. Chapter and Conference Paper

    Collision Search for Elliptic Curve Discrete Logarithm over GF(2 m ) with FPGA

    In this last decade, Elliptic Curve Cryptography (ECC) has gained increasing acceptance in the industry and the academic community and has been the subject of several standards. This interest is mainly due to ...

    Guerric Meurice de Dormale, Philippe Bulens in Cryptographic Hardware and Embedded System… (2007)

  3. No Access

    Chapter and Conference Paper

    Iterative Modular Division over GF(2 m ): Novel Algorithm and Implementations on FPGA

    Public key cryptography is a concept used by many useful functionalities such as digital signature, encryption, key agreements, ... For those needs, elliptic curve cryptography is an attractive solution.

    Guerric Meurice de Dormale in Reconfigurable Computing: Architectures an… (2006)

  4. No Access

    Chapter and Conference Paper

    Efficient Modular Division Implementation

    Elliptic Curve Public Key Cryptosystems (ECPKC) are becoming increasingly popular for use in mobile appliances where bandwidth and chip area are strongly constrained. For the same level of security, ECPKC use ...

    Guerric Meurice de Dormale, Philippe Bulens in Field Programmable Logic and Application (2004)