Search For:

Displaying 1-10 out of 10 total
Efficient Hardware Implementation of Fp-Arithmetic for Pairing-Friendly Curves
Found in: IEEE Transactions on Computers
By Junfeng Fan,Frederik Vercauteren,Ingrid Verbauwhede
Issue Date:May 2012
pp. 676-685
This paper describes a new method to speed up {\hbox{\rlap{I}\kern 2.0pt{\hbox{F}}}}_p-arithmetic in hardware for pairing-friendly curves, such as the well-known Barreto-Naehrig (BN) curves. We explore the characteristics of the modulus defined by these cu...
 
Low-cost fault detection method for ECC using Montgomery powering ladder
Found in: 2011 Design, Automation & Test in Europe
By Duško Karaklajić, Junfeng Fan,Jörn-Marc Schmidt,I Verbauwhede
Issue Date:March 2011
pp. 1-6
When using Elliptic Curve Cryptography (ECC) in constrained embedded devices such as RFID tags, López-Dahab's method along with the Montgomery powering ladder is considered as the most suitable method. It uses x-coordinate only for point representation, a...
   
Breaking Elliptic Curve Cryptosystems Using Reconfigurable Hardware
Found in: International Conference on Field Programmable Logic and Applications
By Junfeng Fan, Daniel V. Bailey, Lejla Batina, Tim Güneysu, Christof Paar, Ingrid Verbauwhede
Issue Date:September 2010
pp. 133-138
This paper reports a new speed record for FPGAs in cracking Elliptic Curve Cryptosystems. We conduct a detailed analysis of different $\textbf{F}_{2^m}$ multiplication approaches in this application. A novel architecture using optimized normal basis multip...
 
FPGA-based testing strategy for cryptographic chips: A case study on Elliptic Curve Processor for RFID tags
Found in: On-Line Testing Symposium, IEEE International
By Junfeng Fan, Miroslav Knezevic, Dusko Karaklajic, Roel Maes, Vladimir Rozic, Lejla Batina, Ingrid Verbauwhede
Issue Date:June 2009
pp. 189-191
Testing of cryptographic chips or components has one extra dimension: physical security. The chip designers should improve the design if it leaks too much information through side-channels, such as timing, power consumption, electric-magnetic radiation, an...
 
Low-cost implementations of NTRU for pervasive security
Found in: Application-Specific Systems, Architectures and Processors, IEEE International Conference on
By Ali Can Atici, Lejla Batina, Junfeng Fan, Ingrid Verbauwhede, S. Berna Ors Yalcin
Issue Date:July 2008
pp. 79-84
NTRU is a public-key cryptosystem based on the shortest vector problem in a lattice which is an alternative to RSA and ECC. This work presents a compact and low power NTRU design that is suitable for pervasive security applications such as RFIDs and sensor...
 
Extended abstract: Unified digit-serial multiplier/inverter in finite field GF(2<sup>m</sup>)
Found in: Hardware-Oriented Security and Trust, IEEE International Workshop on
By Junfeng Fan, Ingrid Verbauwhede
Issue Date:June 2008
pp. 72-75
Modular multiplication and inversion are the essential operations in both Elliptic Curve Cryptosystems (ECC) and HyperElliptic Curve Cryptosystems (HECC). In this paper, we describe a unified digit-serial multiplier/inverter in GF(2<sup>m</sup>...
 
FPGA Design for Algebraic Tori-Based Public-Key Cryptography
Found in: Design, Automation and Test in Europe Conference and Exhibition
By Junfeng Fan, Lejla Batina, Kazuo Sakiyama, Ingrid Verbauwhede
Issue Date:March 2008
pp. 1292-1297
Algebraic torus-based cryptosystems are an alternative for Public-Key Cryptography (PKC). It maintains the security of a larger group while the actual computations are performed in a subgroup. Compared with RSA for the same security level, it allows faster...
 
Efficient Frame Rate Control Algorithm and Its Implementation
Found in: Computer and Computational Sciences, International Multi-Symposiums on
By Haibin Shen, Junfeng Fan
Issue Date:June 2006
pp. 799-802
The Frame Rate Control (FRC) is designed for displaying color level on STN panels. According to a pixel's color level, it controls its ON/OFF state in different frames. In this paper, we proposed a Spatial Expanded FRC (SEFRC) algorithm, which expanded the...
 
Novel RNS Parameter Selection for Fast Modular Multiplication
Found in: IEEE Transactions on Computers
By Gavin Xiaoxu Yao,Junfeng Fan,Ray C.C. Cheung,Ingrid Verbauwhede
Issue Date:August 2014
pp. 2099-2105
The parameter selection of Residue Number Systems (RNS) has a great impact on its computational efficiency. This paper shows that a base extension, the most costly operation in RNS Montgomery multiplication, can be more efficient when the intervals between...
 
FPGA design for algebraic tori-based public-key cryptography
Found in: Proceedings of the conference on Design, automation and test in Europe (DATE '08)
By Ingrid Verbauwhede, Junfeng Fan, Kazuo Sakiyama, Lejla Batina
Issue Date:March 2008
pp. 1-30
Algebraic torus-based cryptosystems are an alternative for Public-Key Cryptography (PKC). It maintains the security of a larger group while the actual computations are performed in a subgroup. Compared with RSA for the same security level, it allows faster...
     
 1