Hotspot


international conference on information technology coding and computing | 2005

A parallelized design for an elliptic curve cryptosystem coprocessor

Fabio Sozzani; Guido Bertoni; Stefano Turcato; Luca Breveglieri

In many applications a software implementation of ECC (elliptic curve cryptography) might be inappropriate due to performance requirements, therefore hardware implementations are needed. We present some results about a novel hardware implementation for ECC, that introduces also a form of parallelism to maximize the use of function units and hence to improve the throughput. Then we propose a comprehensive comparison of this new architecture with both some RSA architectures and other ECC implementations in ASIC VLSI technology.


Archive | 2004

Message Deciphering Method, System and Article

Roberto Sannino; Fabio Sozzani; Guido Bertoni; Gerardo Pelosi; Pasqualina Fragneto


Archive | 2004

Method for establishing a communication between two devices

Fabio Sozzani; Roberto Sannino; Guido Bertoni; Gerardo Pelosi; Pasqualina Fragneto


Archive | 2004

Processor for Executing an Aes-Type Algorithm

Yannick Teglia; Fabrice Romain; Pierre-Yvan Liardet; Pasqualina Fragneto; Fabio Sozzani; Guido Bertoni


Archive | 2004

Method for establishing an encrypted communication by means of keys

Fabio Sozzani; Roberto Sannino; Guido Bertoni; Gerardo Pelosi; Pasqualina Fragneto


Archive | 2006

Protection of a digital quantity contained in an integrated circuit comprising a JTAG interface

Fabio Sozzani


Archive | 2003

A message deciphering method

Guido Bertoni; Pasqualina Fragneto; Gerardo Pelosi; Roberto Sannino; Fabio Sozzani


Archive | 2003

Method and system for establishing secure communication

Guido Bertoni; Pasqualina Fragneto; Gerardo Pelosi; Roberto Sannino; Fabio Sozzani


Archive | 2012

Method for data stream encryption

Guido Bertoni; Fabio Sozzani


Archive | 2011

METHOD OF ENCRYPTING A DATA STREAM

Guido Bertoni; Fabio Sozzani

Researchain Logo
Decentralizing Knowledge