Results, Publications, Presentations and Awards by the Project
Circuit | Open-source code | PhD Theses | International Journals | International Conferences | National Conferences | Invited Talks | Award | |
Total | 1 | 1 | 2 | 6 | 21 | 3 | 3 | 1 |
Details | ASIC 65nm | VHDL code ECC cryptoprocessor | J. Métairie J.-M. Robert | 3 x IEEE Trans. Computers 2 x JCEN, 1 x AMC | 4 x ARITH, 2 x CHES 1 x AsiaCrypt, 1 x ECC 2 x SECRYPT, 1 x ASYNC 1 x ISVLSI, 1 x ASAP 2 x DSD, 1 x WAIFI 1 x COSADE, 1 x CARDIS 1 x InsCrypt, 1 x AfricaCrypt | Compas | Univ. Calgary ECC RAIM | GDR ASR |
Results:
- ASIC version of a cryptoprocessor for elliptic curve cryptography (see details on this page).
- Open source cryptoprocessor for FPGA implementation
PhD Theses:
- Title: Contributions to GF(2^m) arithmetic operators for elliptic curve cryptography
Author: Jérémy Métairie
Defense: Lannion, Université Rennes 1, May 19th, 2016
Access to the thesis (PDF, french document): https://tel.archives-ouvertes.fr/tel-01324924
Funding: this PhD Thesis was funded by PAVOIS project (budget management by CNRS) - Title: Thwart simple power analysis efficiently in asymmetric cryptographic applications, algorithms and implementations
Author: Jean-Marc Robert
Defense: Perpignan, Université Perpignan Via Domitia, Decembre 8th, 2015
Access to the thesis (PDF, french document): https://tel.archives-ouvertes.fr/tel-01269753
Funding: this PhD Thesis was funded by PAVOIS project
Journals:
- Journal of Cryptographic Engineering (accepted paper)
Title: Efficient Regular Modular Exponentiation Using Multiplicative Half-Size Splitting
Authors: C. Negre and T. Plantard
Access to the article (preprint): https://hal.archives-ouvertes.fr/hal-01185249v1 - IEEE Transactions on Computers (Nov. 2016, Vol. 65 N. 11, pp 3495-3501)
Title: Binary-Ternary Plus-Minus Modular Inversion in RNS
Authors: K. Bigou and A. Tisserand
Access to the article (camera ready version): http://hal.inria.fr/hal-01314268
DOI: 10.1109/TC.2016.2529625 - Journal of Cryptographic Engineering (Sep. 2015, Vol. 5, N. 3, pp 171-185)
Title: Vertical and Horizontal Correlation Attacks on RNS-Based Exponentiations
Authors: G. Perin, L. Imbert, P. Maurine, and L. Torres
Access to the article (camera ready version): https://hal.archives-ouvertes.fr/lirmm-01269799
DOI: 10.1007/s13389-015-0095-0 - IEEE Transactions on Computers (2015, Vol. 64, N. 10)
Title: New Parallel Approaches for Scalar Multiplication in Elliptic Curve over Fields of Small Characteristic
Authors: C. Negre and J.-M. Robert
Access to the article (camera ready version): https://hal.archives-ouvertes.fr/hal-00908463v1
DOI: 10.1109/TC.2015.2389817
- IEEE Transactions on Computers (2014, Vol. 63, N. 9)
Title: Efficient Subquadratic Space Complexity Binary Polynomial Multipliers Based On Block Recombination
Authors: M. Cenk, M. A. Hasan and C. Negre
Access to the article (camera ready version): http://hal.inria.fr/hal-00712090
DOI: 10.1109/TC.2013.105
-
Advances in Mathematics of Communications (AMC) (2013, Vol. 7, N. 4, PP. 485-502)
Title: Empirical optimization of divisor arithmetic on hyperelliptic curves over F2m
Authors: L. Imbert and M. J. Jacobson, Jr.
Access to the article (camera ready version): http://hal.inria.fr/hal-00712090
DOI: 10.3934/amc.2013.7.485
International Conferences and Workshops:
- SECRYPT: 13th International Conference on Security and Cryptography (Lisbon, Portugal, July 26-28, 2016)
Title: Efficient Randomized Regular Modular Exponentiation using Combined Montgomery and Barrett Multiplications
Authors: Andrea Lesavourey, Christophe Nègre and Thomas Plantard:
Access to the article (preprint): https://hal.archives-ouvertes.fr/hal-01330898v1 - WAIFI: International Workshop on the Arithmetic of Finite Fields (Ghent, Belgium, July 13-15, 2016)
Title: Enhanced Digital Signature using RNS Digit Exponent RepresentationAuthors: T. Plantard and J.-M. Robert
Access to the article (camera ready version): https://hal.archives-ouvertes.fr/hal-01337561
DOI: - ARITH23: 23rd IEEE International Symposium on
Computer Arithmetic (Santa Clara, CA, USA, July 10-13, 2016)
Title: Hybrid Positional-Residue Number System
Authors: K. Bigou and A. Tisserand
Access to the article informations (camera ready version): https://hal.inria.fr/hal-01314232
DOI: 10.1109/ARITH.2016.15 - SECRYPT: 12th International Conference on Security and Cryptography (Lisbon, Portugal, July 26-28, 2016)
Title: Parallel Approaches for Efficient Scalar Multiplication over Elliptic Curve
Authors: Christophe Nègre and Jean-Marc Robert
Access to the article (preprint): https://hal.archives-ouvertes.fr/hal-01206530v1
DOI:
- DSD: Euromicro Conference on Digital System Design (Funchal, Portugal, Aug. 26-28, 2015)
Title: Fast and Secure Finite Field Multipliers
Authors: Danuta Pamula and Arnaud Tisserand
Access to the article (camera ready version): https://hal.inria.fr/hal-01169851
DOI: 10.1109/DSD.2015.46 - CHES: Workshop on Cryptographic Hardware and Embedded Systems (Saint Malo, France, Sep. 13-16, 2015)
Title: Single Base Modular Multiplication for Efficient Hardware RNS Implementations of ECC
Authors: Karim Bigou and Arnaud Tisserand
Access to the article (camera ready version): https://hal.inria.fr/hal-01199155
DOI: 10.1007/978-3-662-48324-4_7 - ECC (invited presentation): 19th Workshop on Elliptic Curve Cryptography (Bordeaux, France, Sep. 28–30, 2015)
Title: Hardware accelerators for ECC and HECC
Author: Arnaud Tisserand
Access to the slides: https://hal.inria.fr/hal-01207422 - ISVLSI: IEEE Computer Society Annual Symposium on VLSI (Montpellier, France, July 8-10, 2015)
Title: Small Multiplication-Inversion Unit for Normal Basis Representation in GF(2^m)
Authors: Jérémy Métairie, Arnaud Tisserand and Emmanuel Casseau
Access to the article (camera ready version): https://hal.inria.fr/hal-01175712
DOI: 10.1109/ISVLSI.2015.32 - ACISP: 20th Australasian Conference on Information Security and Privacy
(QUT Gardens Point, Australy, June 29 – July 1, 2015)
Title: Trade-off Approaches for Leak Resistant Modular Arithmetic in RNS
Authors: Christophe Negre and Guilherme Perin
Access to the article (camera ready version): https://hal.archives-ouvertes.fr/hal-01143367 - ARITH22: 22nd IEEE International Symposium on
Computer Arithmetic (Lyon, France, June 22-24, 2015)
Title: Efficient Modular Exponentiation Based on Multiple Multiplications by a Common Operand
Authors: Christophe Negre, Thomas Plantard, and Jean-Marc Robert
Access to the article informations (camera ready version): http://hal-lirmm.ccsd.cnrs.fr/lirmm-01142327 - ASYNC: 21st IEEE International Symposium on Asynchronous Circuits and Systems (Silicon Valley, California, USA, May 4-6, 2015)
Title: Asynchronous Charge Sharing Power Consistent Montgomery Multiplier
Authors: J. Chen, A. Tisserand, S. Cotofana and E. Popovici
Access to the article informations (camera ready version): https://hal.inria.fr/hal-01176845
DOI: 10.1109/ASYNC.2015.26
- InsCrypt: 10th International Conference on Information Security and Cryptology (Beijing, China, December 13-15, 2014)
Title: Parallelized Software Implementations of Elliptic Curve Scalar Multiplication
Authors: Jean-Marc Robert
Access to the article (camera ready version): https://hal.archives-ouvertes.fr/hal-00998277
AsiaCrypt: 20th Annual International Conference on the Theory and Application of Cryptology and Information Security (Kaohsiung, Taiwan, R.O.C., December 7-11, 2014)
Title: Soft Analytical Side-Channel Attacks
Authors: Nicolas Veyrat-Charvillon, Benoît Gérard and François-Xavier Standaert
Access to the article informations (camera ready version): https://hal.inria.fr/hal-01096218
DOI: 10.1007/978-3-662-45611-8_15
ASAP: 25th IEEE International Conference on Application-specific Systems, Architectures and Processors (Zurich, Switzerland, June 18-20, 2014)
Title: RNS Modular Multiplication through Reduced Base Extensions
Authors: Karim Bigou and Arnaud Tisserand
Access to the article informations (camera ready version): https://hal.inria.fr/hal-01010961
DOI: 10.1109/ASAP.2014.6868631
- COSADE: 5th International Workshop on Constructive Side-Channel Attacks and Secure Design (Paris, France, Arp. 14-15, 2014)
Title: Attacking Randomized Exponentiations Using Unsupervised Learning
Authors: Guilherme Perin, Laurent Imbert, Lionel Torres and Philippe Maurine
Access to the article informations (camera ready version): http://hal-lirmm.ccsd.cnrs.fr/lirmm-01096039
DOI: 10.1007/978-3-319-10175-0_11
- CARDIS: 12th Smart Card Research and Advanced Application Conference (Berlin, Germany, Nov. 27-29, 2013)
Title: Practical Analysis of RSA Countermeasures Against Side-Channel Electromagnetic Attacks
Authors: Guilherme Perin, Laurent Imbert, Lionel Torres and Philippe Maurine
Access to the article informations (camera ready version): http://hal-lirmm.ccsd.cnrs.fr/lirmm-01096070
- DSD: 16th Euromicro Conference on Digital System Design (Santander, Spain, Sep. 4-6, 2013)
Title: Electromagnetic Analysis on RSA Algorithm Based on RNS
Authors: Guilherme Perin, Laurent Imbert, Lionel Torres and Philippe Maurine
Access to the article informations: http://hal-lirmm.ccsd.cnrs.fr/lirmm-00861215
- CHES: Workshop on Cryptographic Hardware and Embedded Systems, CHES 2013 (Santa Barbara, CA, USA, Aug. 20-23, 2013)
Title: Improving Modular Inversion in RNS using the Plus-Minus Method
Authors: Karim Bigou and Arnaud Tisserand
Access to the article (camera ready version): http://hal.inria.fr/hal-00825745
DOI: 10.1007/978-3-642-40349-1_14
- AfricaCrypt: 6th International Conference on
Cryptology in Africa (Cairo, Egypt, June 22-24, 2013)
Title: Impact of Optimized Operations AB,AC and AB+CD in Scalar Multiplication over Binary Elliptic Curve
Authors: Christophe Nègre and Jean-Marc Robert
Acces to the article (camera ready version): http://hal.inria.fr/hal-00724785
- ARITH21: 21st IEEE International Symposium on
Computer Arithmetic (Austin, Texas, USA, April 7-10, 2013)
Title: Parallel modular multiplication on multi-core processors
Authors: Pascal Giorgi, Laurent Imbert and Thomas Izard
Acces to the article (camera ready version): http://hal.archives-ouvertes.fr/hal-00805242
DOI: 10.1109/ARITH.2013.20
- ARITH21: 21st IEEE International Symposium on
Computer Arithmetic (Austin, Texas, USA, April 7-10, 2013)
Title: On-the-Fly Multi-Base Recoding for ECC Scalar Multiplication without Pre-Computations
Authors: Thomas Chabrier and Arnaud Tisserand
Acces to the article (camera ready version): http://hal.inria.fr/hal-00772613
DOI: 10.1109/ARITH.2013.17
National Conferences:
- ComPAS 2015 : Conférence d’informatique en Parallélisme, Architecture et Système (Lille, France, 30 juin – 3 juillet 2015)
Titre : Comparaison expérimentale d'architectures de crypto-processeurs pour courbes elliptiques et hyper-elliptiques
Auteurs : G. Gallin, A. Tisserand and N. Veyrat-Charvillon
Accès à l'article (version finale des auteurs): http://hal.inria.fr/hal-01171094 - ComPAS 2015 : Conférence d’informatique en Parallélisme, Architecture et Système (Lille, France, 30 juin – 3 juillet 2015)
Titre : Full Hardware Implementation of Short Addition Chains Recoding for ECC Scalar Multiplication
Auteurs : J. Proy, N. Veyrat-Charvillon, A. Tisserand et N. Meloni
Accès à l'article (version finale des auteurs): http://hal.inria.fr/hal-01171095 - ComPAS 2013 : Conférence d’informatique en Parallélisme, Architecture et Système (Grenoble, France, 15-18 janvier 2013)
Titre: Opérateur matériel de tests de divisibilité par des petites constantes sur de très grands entiers
Auteurs: Karim Bigou, Thomas Chabrier et Arnaud Tisserand
Accès à l'article (version finale des auteurs): http://hal.inria.fr/hal-00772703
National Award:
- The research works from Karim Bigou on "RNS for ECC" have been selected as one of the two best 2013 nationwide results from the Architecture track of the GDR ASR from CNRS (see details in French).
Other Publications and Presentations :
IACR Eprint Archives Report N. 2015/475
Title: Randomizing scalar multiplication using exact covering systems of congruences
Authors: Eleonora Guerrini, Laurent Imbert and Théo Winterhalter
Acces to the report: https://eprint.iacr.org/2015/475- Invited talk at Workshop on Explicit Methods for Abelian Varieties (Calgary, AB, Canada, May 25-29, 2015)
Title: Randomizing Scalar Multiplication Using Exact Covering Systems of Congruences
Author: Laurent Imbert
Acces to the abstract: https://www.pims.math.ca/scientific-event/150525-emavkw
- Cours invité (invited talk) 7ème Rencontre Arithmétique de l'Informatique Mathématique RAIM (Rennes, France, 7-9 avril 2015)
Titre: Recent Advances in Parallel Implementations of Scalar Multiplication over Binary Elliptic Curves
Auteur: Christophe Nègre
Accès aux informations: https://hal.archives-ouvertes.fr/hal-01141628 - Poster et exposé à la 7ème Rencontre Arithmétique de l'Informatique Mathématique RAIM (Rennes, France, 7-9 avril 2015)
Titre: RNS Modular Computations for Cryptographic Applications
Auteurs: Karim Bigou and Arnaud Tisserand
Accès aux informations: https://hal.inria.fr/hal-01141347 - CryptSeminar, University of Wollongong (Wollongong, Australia, 28th November 2014)
Title: Elliptic Curve Scalar Multiplication, Side-Channel Attacks and Counter-measures
Author: Jean-Marc Robert - Poster à la 7ème Rencontre Arithmétique de l'Informatique Mathématique RAIM (Rennes, France, 7-9 avril 2015)
Titre: Hardware and Arithmetic for Hyperelliptic Curves CryptographyAuteurs: Gabriel Gallin, Arnaud Tisserand and Nicolas Veyrat-Charvillon
Accès aux informations: https://hal.inria.fr/hal-01134020 - Présentation aux Journées C2 Code et Cryptographie (Les Sept Laux, France, 24-28 mars 2014)
Titre: Algorithmes parallèles de multiplication scalaire optimisée sur courbes elliptiques binaires
Auteur: Jean-Marc Robert
Accès aux informations: http://hal-lirmm.ccsd.cnrs.fr/lirmm-01121960
- Papier court et poster au Colloque National du GDR SoC-SiP (Lyon, France, 10-12 juin 2013)
Titre: Crypto-processeur ECC en RNS sur FPGA avec inversion modulaire rapide
Auteurs: Karim Bigou et Arnaud Tisserand
Accès au document: http://hal.inria.fr/hal-00830610
- Présentation à la 4ème Rencontre Crypto'Puces (Îles de Porquerolles, France, 27-31 mai 2013)
Titre: Avancées sur l'utilisation de la représentation RNS pour la cryptographie sur courbes elliptiques
Auteur: Karim Bigou
Accès aux informations: http://hal.inria.fr/hal-00830504
- Présentation au Congrès des Doctorants de l'UPVD (mai 2013)
Titre: Cryptographie, attaques par canal auxiliaire
Auteur: Jean-Marc Robert
- Poster à l'École Jeunes Chercheurs en Informatique Mathématique EJCIM (Perpignan, France, 8-12 avril 2013)
Titre: État Des Lieux Attaques Passives Courbes Elliptiques
Auteur: Jean-Marc Robert
Accès au document: http://hal-lirmm.ccsd.cnrs.fr/lirmm-00862374
- Présentation aux Journées C2 Code et Cryptographie (Dinard, France, 7-12 octobre 2012)
Titre: Algorithmes et Implémentations Optimisées de Calculs Cryptographiques sur les Courbes Elliptiques Binaires
Auteur: Jean-Marc Robert
Accès aux informations: http://hal-lirmm.ccsd.cnrs.fr/lirmm-01121958