Matches in SemOpenAlex for { <https://semopenalex.org/work/W2896622938> ?p ?o ?g. }
Showing items 1 to 96 of
96
with 100 items per page.
- W2896622938 abstract "Abstract Considering that Elliptic Curve Digital Signature Algorithm (ECDSA) implementations need to be efficient, flexible and Side Channel Attack (SCA) resistant, in this paper, a design approach and architecture for ECDSA and the underlined scalar multiplication operation is proposed for GF(2k), satisfying the above three directives. To achieve that, in the paper, Binary Edwards Curves (BECs) are adopted as an alternative to traditional Weierstrass Elliptic Curves (ECs) for GF(2k) since they offer intrinsic SCA resistance against simple attacks due to their uniformity, operation regularity and completeness. To achieve high performance and flexibility, we propose a hardware/software ECDSA codesign approach where scalar multiplication is implemented in hardware and integrated in the ECDSA functionality through appropriate drivers of an ECDSA software stack. To increase BEC scalar multiplier performance and introduce SCA resistance we adopt and expand a parallelism design strategy/methodology where GF(2k) operations of a scalar multiplier round for both point operations performed in this round are reordered and assigned into parallelism layer in order to be executed concurrently. Within this strategy we include hardware and software based SCA countermeasures that rely on masking/randomization and hiding. While scalar randomization is realized by the ECDSA software stack in an easy way, in order to achieve resistance using hardware means, we propose and introduce in every scalar multiplier round, within the parallelism layers, projective coordinates randomization of all the round’s output points. So, in our approach, considering that with the proposed parallelism plan in every scalar multiplier round BEC point operations are performed in parallel and that the round’s output points are randomized with a different number in each round, we manage to achieve maximum SCA resistance. To validate this resistance, we introduce and realize a leakage assessment process on BEC scalar multipliers for the first time in research literature. This process is based on real measurements collected from a controlled SAKURA X environment with a GF(2233) based scalar multiplier implementation. Using Welch’s t-test we investigate possible information leakage of the multiplier’s input point and scalar and after an extended analysis we find trivial leakage. Finally, we validate the ECDSA architecture and its scalar multiplier efficiency by implementing it on a Zynq 7000 series FPGA Avnet Zedboard and collecting very promising, well balanced, results on speed and hardware resources in comparison with other works." @default.
- W2896622938 created "2018-10-26" @default.
- W2896622938 creator A5009886382 @default.
- W2896622938 creator A5052180680 @default.
- W2896622938 creator A5073797976 @default.
- W2896622938 creator A5090802119 @default.
- W2896622938 date "2019-02-01" @default.
- W2896622938 modified "2023-09-27" @default.
- W2896622938 title "Design and leakage assessment of side channel attack resistant binary edwards Elliptic Curve digital signature algorithm architectures" @default.
- W2896622938 cites W1177983346 @default.
- W2896622938 cites W1514429798 @default.
- W2896622938 cites W1583456310 @default.
- W2896622938 cites W1862426464 @default.
- W2896622938 cites W1970154887 @default.
- W2896622938 cites W1985361237 @default.
- W2896622938 cites W1993176221 @default.
- W2896622938 cites W2004814164 @default.
- W2896622938 cites W2020207242 @default.
- W2896622938 cites W2020463711 @default.
- W2896622938 cites W2037107113 @default.
- W2896622938 cites W2082081063 @default.
- W2896622938 cites W2085540322 @default.
- W2896622938 cites W2111978877 @default.
- W2896622938 cites W2154290215 @default.
- W2896622938 cites W2321801529 @default.
- W2896622938 cites W2578795631 @default.
- W2896622938 cites W2584750462 @default.
- W2896622938 doi "https://doi.org/10.1016/j.micpro.2018.07.003" @default.
- W2896622938 hasPublicationYear "2019" @default.
- W2896622938 type Work @default.
- W2896622938 sameAs 2896622938 @default.
- W2896622938 citedByCount "9" @default.
- W2896622938 countsByYear W28966229382019 @default.
- W2896622938 countsByYear W28966229382020 @default.
- W2896622938 countsByYear W28966229382021 @default.
- W2896622938 countsByYear W28966229382023 @default.
- W2896622938 crossrefType "journal-article" @default.
- W2896622938 hasAuthorship W2896622938A5009886382 @default.
- W2896622938 hasAuthorship W2896622938A5052180680 @default.
- W2896622938 hasAuthorship W2896622938A5073797976 @default.
- W2896622938 hasAuthorship W2896622938A5090802119 @default.
- W2896622938 hasConcept C111919701 @default.
- W2896622938 hasConcept C11413529 @default.
- W2896622938 hasConcept C124584101 @default.
- W2896622938 hasConcept C134306372 @default.
- W2896622938 hasConcept C139719470 @default.
- W2896622938 hasConcept C148730421 @default.
- W2896622938 hasConcept C162324750 @default.
- W2896622938 hasConcept C167615521 @default.
- W2896622938 hasConcept C171182647 @default.
- W2896622938 hasConcept C173608175 @default.
- W2896622938 hasConcept C178489894 @default.
- W2896622938 hasConcept C179603306 @default.
- W2896622938 hasConcept C197966572 @default.
- W2896622938 hasConcept C203062551 @default.
- W2896622938 hasConcept C2777904410 @default.
- W2896622938 hasConcept C33923547 @default.
- W2896622938 hasConcept C41008148 @default.
- W2896622938 hasConcept C49289754 @default.
- W2896622938 hasConcept C9390403 @default.
- W2896622938 hasConceptScore W2896622938C111919701 @default.
- W2896622938 hasConceptScore W2896622938C11413529 @default.
- W2896622938 hasConceptScore W2896622938C124584101 @default.
- W2896622938 hasConceptScore W2896622938C134306372 @default.
- W2896622938 hasConceptScore W2896622938C139719470 @default.
- W2896622938 hasConceptScore W2896622938C148730421 @default.
- W2896622938 hasConceptScore W2896622938C162324750 @default.
- W2896622938 hasConceptScore W2896622938C167615521 @default.
- W2896622938 hasConceptScore W2896622938C171182647 @default.
- W2896622938 hasConceptScore W2896622938C173608175 @default.
- W2896622938 hasConceptScore W2896622938C178489894 @default.
- W2896622938 hasConceptScore W2896622938C179603306 @default.
- W2896622938 hasConceptScore W2896622938C197966572 @default.
- W2896622938 hasConceptScore W2896622938C203062551 @default.
- W2896622938 hasConceptScore W2896622938C2777904410 @default.
- W2896622938 hasConceptScore W2896622938C33923547 @default.
- W2896622938 hasConceptScore W2896622938C41008148 @default.
- W2896622938 hasConceptScore W2896622938C49289754 @default.
- W2896622938 hasConceptScore W2896622938C9390403 @default.
- W2896622938 hasLocation W28966229381 @default.
- W2896622938 hasOpenAccess W2896622938 @default.
- W2896622938 hasPrimaryLocation W28966229381 @default.
- W2896622938 hasRelatedWork W2026347421 @default.
- W2896622938 hasRelatedWork W2108182649 @default.
- W2896622938 hasRelatedWork W2117129665 @default.
- W2896622938 hasRelatedWork W2187713017 @default.
- W2896622938 hasRelatedWork W2361273900 @default.
- W2896622938 hasRelatedWork W2367688749 @default.
- W2896622938 hasRelatedWork W2741585127 @default.
- W2896622938 hasRelatedWork W2896622938 @default.
- W2896622938 hasRelatedWork W2188111145 @default.
- W2896622938 hasRelatedWork W2260005205 @default.
- W2896622938 isParatext "false" @default.
- W2896622938 isRetracted "false" @default.
- W2896622938 magId "2896622938" @default.
- W2896622938 workType "article" @default.