Hardware Arithmetic Units and Cryptoprocessors for Hyperelliptic - - PowerPoint PPT Presentation

hardware arithmetic units and cryptoprocessors for
SMART_READER_LITE
LIVE PREVIEW

Hardware Arithmetic Units and Cryptoprocessors for Hyperelliptic - - PowerPoint PPT Presentation

Hardware Arithmetic Units and Cryptoprocessors for Hyperelliptic Curve Cryptography Gabriel GALLIN CNRS IRISA Univ. Rennes 1 November 29 th , 2018 Ph.D. supervised by Arnaud TISSERAND, CNRS Lab-STICC Introduction 1 HTMM


slide-1
SLIDE 1

Hardware Arithmetic Units and Cryptoprocessors for Hyperelliptic Curve Cryptography

Gabriel GALLIN

CNRS – IRISA – Univ. Rennes 1

November 29th, 2018

Ph.D. supervised by Arnaud TISSERAND, CNRS – Lab-STICC

slide-2
SLIDE 2

1

Introduction

2

HTMM – Hyper-Threaded Modular Multipliers

3

Hardware cryptoprocessors for HECC

4

Conclusion and Perspectives

G.Gallin Ph.D. Defense 29.11.2018 2 / 34

slide-3
SLIDE 3

Introduction

Cybersecurity Challenges

◮ Digital systems are widely used in many applications

◮ economy: credit cards, online payments, ... ◮ medical: medical files, e-Health devices, ... ◮ Internet of Things (IoT): self-driving cars, smart homes, ... ◮ communications: telephony, emails, social networks, ... ◮ ...

◮ Strong needs for efficent digital security

◮ fast for user convinience ◮ reduced power consumption for battery-based systems ◮ small circuit area for embedded systems ◮ resistant to attacks: theoretical, logical and physical G.Gallin Ph.D. Defense 29.11.2018 3 / 34

slide-4
SLIDE 4

Introduction

Example: Simplified Payment with Credit Cards

Terminal Bank Credit Card

Cryptographic primitives:

◮ authentication: asserts identity of user, credit card and bank ◮ integrity: ensures exchanged data are complete and unmodified ◮ confidentiality: asserts secrecy of exchanded data

G.Gallin Ph.D. Defense 29.11.2018 4 / 34

slide-5
SLIDE 5

Introduction

Overview on Cryptography: Symmetric Cryptography

◮ Also called secret-key cryptography ◮ Encryption and decryption with shared secret key

key

H e l l

  • 5

. d 9 x

message

Encryption

key

H e l l

  • 5

. d 9 x Decryption

message

sender receiver ◮ Very efficient and wildely used to ensure confidentiality ◮ Problems with symmetric cryptography

◮ secret key must be shared between sender and receiver ◮ communications with several parties → many keys to manage G.Gallin Ph.D. Defense 29.11.2018 5 / 34

slide-6
SLIDE 6

Introduction

Overview on Cryptography: Asymmetric Cryptography

◮ Also known as public-key cryptography (PKC)

◮ uses a pair of private key and public key ◮ extensively used for digital signatures and key exchanges ◮ more expensive than symmetric cryptography

◮ First PKC: RSA proposed by Rivest, Shamir and Adleman in 1978

◮ huge commercial success and still widely used ◮ large keys (> 2000 bits recommended) and very costly for embedded

applications

◮ Elliptic Curve Cryptography by Miller in 1985 and Koblitz in 1987

◮ 200 to 500 bits keys recommended: better performances than RSA ◮ current PKC standard for various secured applications

e.g. french passports or secured Internet browsing

G.Gallin Ph.D. Defense 29.11.2018 6 / 34

slide-7
SLIDE 7

Introduction

Hyper-Elliptic Curve Cryptography

◮ HECC proposed by Koblitz in 1988

◮ size of internal values divided by 2 but more arithmetic operations ◮ before late 2000s, HECC was less efficient than ECC

◮ New HECC cryptosystem proposed by Gaudry [1] in 2007

◮ requires less arithmetic operations ◮ more efficient than ECC in theory ◮ size of internal values is around 128 bits (equiv. to ECC 256b)

◮ µKummer proposed by Renes et al. [6] in 2016

◮ software implementation of Gaudry’s HECC on microcontrollers ◮ -75% and -35% time for digital signature and key exchange

◮ Very few recent hardware implementations of recent HECC

cryptosystems

G.Gallin Ph.D. Defense 29.11.2018 7 / 34

slide-8
SLIDE 8

Introduction

HAH Project

◮ Hardware and Arithmetic for HECC ◮ 3-year labex project (2014-2017) involving

◮ IRISA / Lab-STICC funded by labex CominLabs and Britanny region ◮ IRMAR lab. for mathematics funded by labex Lebesgue G.Gallin Ph.D. Defense 29.11.2018 8 / 34

slide-9
SLIDE 9

Introduction

HAH Project: Objectives

◮ Propose new units for basic arithmetic operations in HECC

◮ modular arithmetic for 128–300-bit operands ◮ design small circuits with high frequencies and low computation time

◮ Design new hardware cryptoprocessors for HECC

◮ implement best state-of-the-art HECC cryptosystems ◮ explore various performance vs. cost tradeoffs ◮ confirm efficiency of HECC vs. ECC in hardware

◮ Robust against physical attacks: SPA (Simple Power Analysis) ◮ Flexible designs to support different curves and parameters

G.Gallin Ph.D. Defense 29.11.2018 9 / 34

slide-10
SLIDE 10

HTMM – Hyper-Threaded Modular Multipliers

Summary

1

Introduction

2

HTMM – Hyper-Threaded Modular Multipliers

3

Hardware cryptoprocessors for HECC

4

Conclusion and Perspectives

G.Gallin Ph.D. Defense 29.11.2018 10 / 34

slide-11
SLIDE 11

HTMM – Hyper-Threaded Modular Multipliers

Modular Operations in HECC

◮ HECC requires to compute arithmetic operations (±, ×) in GF(P)

◮ operands and results ∈ {0, 1, ..., P − 1} ◮ P is a 100–300-bit prime

◮ Most frequent and costly operation: modular multiplication (MM)

e.g. 75% of overall computation time in µKummer [6]

◮ Example: multiplications modulo small P = 23

2 × 10 = 20 2 × 10 mod 23 = 20 9 × 18 = 162 9 × 18 mod 23 = 1 4 × 10 = 40 4 × 10 mod 23 = 17 19 × 17 = 323 19 × 17 mod 23 = 1

G.Gallin Ph.D. Defense 29.11.2018 11 / 34

slide-12
SLIDE 12

HTMM – Hyper-Threaded Modular Multipliers

Modular Reduction

◮ Fast reduction modulo specific primes with specific structures

◮ e.g. Mersenne prime P = 2127 − 1 ∗ used in µKummer: ◮ limited to very few primes: not possible with flexibility constraints

◮ Reduction modulo generic primes

◮ more complex but supports all primes of a given max. size ◮ several efficient algorithms for operations modulo generic P ∗2127 − 1 = (111111111111111111111111...111111111111111111111111)2 G.Gallin Ph.D. Defense 29.11.2018 12 / 34

slide-13
SLIDE 13

HTMM – Hyper-Threaded Modular Multipliers

Modular Multiplication: Montgomery’s Algorithm

◮ Montgomery Modular Multiplication proposed in 1985 [5]

◮ best MM algorithm for generic primes P ◮ max. size of P: m − 2 bits G.Gallin Ph.D. Defense 29.11.2018 13 / 34

slide-14
SLIDE 14

HTMM – Hyper-Threaded Modular Multipliers

Interleaved MMM

◮ MMM operands are split into s words of w bits (s × w = m)

◮ CIOS (Coarsely Integrated Operand Scanning) from Koc et al. [2] ◮ iterations over small partial products with partial reduction steps ◮ strong dependencies between iterations G.Gallin Ph.D. Defense 29.11.2018 14 / 34

slide-15
SLIDE 15

HTMM – Hyper-Threaded Modular Multipliers

Interleaved MMM

◮ MMM operands are split into s words of w bits (s × w = m)

◮ CIOS (Coarsely Integrated Operand Scanning) from Koc et al. [2] ◮ iterations over small partial products with partial reduction steps ◮ strong dependencies between iterations G.Gallin Ph.D. Defense 29.11.2018 14 / 34

slide-16
SLIDE 16

HTMM – Hyper-Threaded Modular Multipliers

Interleaved MMM

◮ MMM operands are split into s words of w bits (s × w = m)

◮ CIOS (Coarsely Integrated Operand Scanning) from Koc et al. [2] ◮ iterations over small partial products with partial reduction steps ◮ strong dependencies between iterations G.Gallin Ph.D. Defense 29.11.2018 14 / 34

slide-17
SLIDE 17

HTMM – Hyper-Threaded Modular Multipliers

Interleaved MMM

◮ MMM operands are split into s words of w bits (s × w = m)

◮ CIOS (Coarsely Integrated Operand Scanning) from Koc et al. [2] ◮ iterations over small partial products with partial reduction steps ◮ strong dependencies between iterations G.Gallin Ph.D. Defense 29.11.2018 14 / 34

slide-18
SLIDE 18

HTMM – Hyper-Threaded Modular Multipliers

Hyper-Threading: Principle

◮ Dependencies in CIOS → idle stages in the pipeline time ◮ Our solution: fill idle pipeline stages with independent MMMs time ◮ Hyper-Threaded Modular Multiplier

◮ HTMM: physical unit computing σ independent MMMs concurrently ◮ hardware ressources are shared among σ Logical Multipliers (LMs) G.Gallin Ph.D. Defense 29.11.2018 15 / 34

slide-19
SLIDE 19

HTMM – Hyper-Threaded Modular Multipliers

HTMM Architecture

◮ Based on 3 pipelined blocks (1 for each partial product in CIOS) ◮ Width of internal words fixed to w = 34 bits → only 9 DSP slices ◮ 3 to 4 stages in DSP slices to reach high frequencies Task 2 Task 3 Task 1

RAM RAM

G.Gallin Ph.D. Defense 29.11.2018 16 / 34

slide-20
SLIDE 20

HTMM – Hyper-Threaded Modular Multipliers

Tools for Architectures Exploration

◮ Many HTMM parameters to explore: size of P (e.g. 128 or 256 bits),

w, number of LMs, configurations of memories and DSP slices, algorithmic optimizations, ...

◮ We designed a software HTMM generator

◮ allows fast generation of VHDL codes for many HTMM specifications ◮ and optimized for various FPGAs (e.g. pipeline config. in DSP slices) ◮ available as open-source 1

◮ HTMM generator also offers support for some third-party softwares

◮ Xilinx tools for implementation, simulation and evaluation ◮ Sage mathematics software 2 for numerical validation of HTMM 1HTMM generator available at https://sourcesup.renater.fr/htmm/ 2available as open-source at http://www.sagemath.org/ G.Gallin Ph.D. Defense 29.11.2018 17 / 34

slide-21
SLIDE 21

HTMM – Hyper-Threaded Modular Multipliers

Exploration of 128 bits HTMMs on Virtex-4 and Virtex-7

400 400 500 500 600 600 700 700 700 800 800

area [LUTs]

400 400 450 450 500 500 550 550 600 600

time [ns]

+116% +61% F35B F35D F44B F44D F45B F45D S35B S35D S44B S44D S45B S45D

V4

510 540 540 570 570 600 600 630 630 660

area [LUTs]

250 250 250 300 300 300 350 350 350 400 400

time [ns]

+26% +72% F35B F35D F44B F44D F45B F45D S35B S35D S44B S44D S45B S45D

V7

◮ Wide exploration space of solutions for time vs. area tradeoffs ◮ Not a lot a “best” solutions (on Pareto fronts) ◮ Tradeoffs and “best” solutions depend on FPGA

G.Gallin Ph.D. Defense 29.11.2018 18 / 34

slide-22
SLIDE 22

HTMM – Hyper-Threaded Modular Multipliers

Comparison with 128b MMM from Ma et al. [4]

MA16: reimplementation of multiplier from [4] for 128 bits on Virtex-7

74 78 82 86 138 142 146 312 150 S44B D 9 1.0 B 2 S 287 0.9 L 523 0.9 F 683 0.9 f 481 0.8 75 79 83 87 139 143 147 286 151 F44B D 9 1.0 B 2 S 325 1.1 L 545 0.9 F 725 1.0 f 528 0.8 75 79 83 87 139 143 147 239 151 F44D D 9 1.0 B 0 S 306 1.0 L 600 1.0 F 758 1.0 f 633 1.0 100 200 300 400 500 time [ns] 27 47 67 87 107 127 147 478 167 MA16 D 21 2.3 B 6 S 455 1.5 L 1182 2.0 F 1305 1.7 f 350 0.6

◮ HTMM is smaller and faster than MA16 ◮ HTMM reaches max. frequencies of DSP slices / BRAMs

G.Gallin Ph.D. Defense 29.11.2018 19 / 34

slide-23
SLIDE 23

Hardware cryptoprocessors for HECC

Summary

1

Introduction

2

HTMM – Hyper-Threaded Modular Multipliers

3

Hardware cryptoprocessors for HECC

4

Conclusion and Perspectives

G.Gallin Ph.D. Defense 29.11.2018 20 / 34

slide-24
SLIDE 24

Hardware cryptoprocessors for HECC

Hyperelliptic Curves and Operations for Cryptography

◮ Hyperelliptic curve: points with coordinates verifing a given equation

◮ for HECC, points coordinates are in GF(P) ◮ only secure curves with good properties for crypto are used in HECC

◮ Main curve operation: scalar multiplication [k]P

◮ corresponds to adding k times a point P of curve to itself ◮ involves many arithmetic operations on coordinates → very costly

e.g. ∼ 8000 MMs for 256-bit k

◮ P is public but k is the private key

◮ the value of k must remain secret during computations of [k]P ◮ need robust algorithms and implementations to protect k against

physical attacks, e.g. SPA (Simple Power Analysis)

G.Gallin Ph.D. Defense 29.11.2018 21 / 34

slide-25
SLIDE 25

Hardware cryptoprocessors for HECC

Scalar Multiplication Algorithms (for µKummer)

Require: nk-bit scalar k = nk−1

i=0

2iki, point P, cst ∈ GF(P)4 Ensure: V1 = [k]P, V2 = [k + 1]P V1 ← cst V2 ← P for i = nk − 1 downto 0 do (V1, V2) ← CSWAP(ki, (V1, V2)) (V1, V2) ← xDBLADD(V1, V2, P) (V1, V2) ← CSWAP(ki, (V1, V2)) end for return (V1, V2)

CSWAP(ki, (P1, P2)) returns (P1, P2) if ki = 0, else (P2, P1)

◮ Constant time and uniform operations (independent from ki bits) ◮ CSWAP: very simple but involves secret bits: must be protected

G.Gallin Ph.D. Defense 29.11.2018 22 / 34

slide-26
SLIDE 26

Hardware cryptoprocessors for HECC

xDBLADD Operation

M S IN OUT M M M M M M M M M M M M M M M M M M S S S S S S S S S S S OUT OUT OUT OUT OUT OUT OUT cst cst cst cst cst cst cst cst cst cst cst IN IN IN IN IN IN IN M

◮ Complex operation based on 32 MM (M/S) and 32 modular add/sub ◮ Regular patterns of 8 independant operations → internal parallelism

G.Gallin Ph.D. Defense 29.11.2018 23 / 34

slide-27
SLIDE 27

Hardware cryptoprocessors for HECC

Basic Cryptoprocessor Architecture

Ctrl DMUX

Data Memory Control Program Memory

areas not to scale

◮ arithmetic units ◮ data memory ◮ interconnect ◮ program memory ◮ central control unit ◮ Various architecture parameters: number of units, width ˜

w, architecture topology, ...

◮ Full description of many cryptoprocessors in VHDL is not feasible

◮ time consuming and validation requires heavy simulations G.Gallin Ph.D. Defense 29.11.2018 24 / 34

slide-28
SLIDE 28

Hardware cryptoprocessors for HECC

Units Library in VHDL

◮ Available units

◮ GF(P) adders and subtractors (with various ˜

w)

◮ HTMMs ◮ data memories (with various ˜

w)

◮ Fully described, implemented and validated in VHDL

◮ behavior is known exactly at each clock cycle (CABA3) ◮ hardware area cost for each unit is perfectly known for various FPGAs

◮ Implementation results form a small database

3Cycle-Accurate Bit-Accurate G.Gallin Ph.D. Defense 29.11.2018 25 / 34

slide-29
SLIDE 29

Hardware cryptoprocessors for HECC

CCABA Exploration Tool

◮ High-level architectures modeled in CCABA

◮ CCABA: Critical CABA4 ◮ only critical cycles and signals at architecture level are CABA

e.g. units I/Os and control

◮ CCABA model is close to TLM5 adapted for asymmetric crypto.

applications

◮ CCABA simulator for fast validation of architectures models ◮ Exploration tool for fast evaluation of many architectures

◮ performances in clock cycles known exactly from CCABA simulations ◮ accurate area estimation based on units library database results 4Cycle-Accurate Bit-Accurate 5Transaction Level Modeling G.Gallin Ph.D. Defense 29.11.2018 26 / 34

slide-30
SLIDE 30

Hardware cryptoprocessors for HECC

Architectures Implemention and Validation in VHDL

◮ Most interesting architectures have been fully described in VHDL

◮ A2: small architecture with 1 Mem, 1 AddSub, 1 Mult

Ctrl DMUX

Data Memory Control Program Memory

areas not to scale

◮ Different versions of memories/interconnect with ˜

w ∈ {34, 68, 136}

◮ complete VHDL description of control for each ˜

w

◮ implemented and validated on Virtex-4/5, Spartan-6 and Zynq-7 G.Gallin Ph.D. Defense 29.11.2018 27 / 34

slide-31
SLIDE 31

Hardware cryptoprocessors for HECC

Architectures Implemention and Validation in VHDL

◮ Most interesting architectures have been fully described in VHDL

◮ A2: small architecture with 1 Mem, 1 AddSub, 1 Mult ◮ A3: big architecture with 1 Mem, 2 AddSub, 2 Mult

Ctrl DMUX

Data Memory Control Program Memory

areas not to scale

◮ Different versions of memories/interconnect with ˜

w ∈ {34, 68, 136}

◮ complete VHDL description of control for each ˜

w

◮ implemented and validated on Virtex-4/5, Spartan-6 and Zynq-7 G.Gallin Ph.D. Defense 29.11.2018 27 / 34

slide-32
SLIDE 32

Hardware cryptoprocessors for HECC

Architectures Implemention and Validation in VHDL

◮ Most interesting architectures have been fully described in VHDL

◮ A2: small architecture with 1 Mem, 1 AddSub, 1 Mult ◮ A3: big architecture with 1 Mem, 2 AddSub, 2 Mult ◮ A4: big clustered architecture with 2 Mem, 2 AddSub, 2 Mult

Control

ADD/SUB

Data Memory

ADD/SUB

Program Memory Data Memory

areas not to scale

◮ Different versions of memories/interconnect with ˜

w ∈ {34, 68, 136}

◮ complete VHDL description of control for each ˜

w

◮ implemented and validated on Virtex-4/5, Spartan-6 and Zynq-7 G.Gallin Ph.D. Defense 29.11.2018 27 / 34

slide-33
SLIDE 33

Hardware cryptoprocessors for HECC

Implementation Results for Best Cryptoprocessors

FPGA archi. ˜ w LUT FF logic DSP BRAM freq. time [k]P bits slices slices MHz ms Virtex-4 A2 34 863 1689 1081 9 4 327 0.54 A4 34 1699 3255 2447 18 7 328 0.39 A3 136 3959 5251 3492 18 9 290 0.37 Virtex-5 A2 34 783 1653 558 9 4 386 0.45 A4 34 1413 3182 1019 18 7 378 0.34 A3 136 2658 5170 1657 18 9 356 0.30 Spartan-6 A2 34 911 1619 382 9 4 298 0.59 A4 34 1565 3120 809 18 7 276 0.46 A3 136 3128 5040 1182 18 9 238 0.45 Zynq-7 A2 34 855 1619 463 9 4 347 0.50 A4 34 1475 3020 747 18 7 360 0.36 A3 136 3147 5033 1143 18 9 322 0.33

◮ ˜

w = 68 bits is not interesting in our architectures

◮ No best solution but various interesting time vs. area tradoffs

G.Gallin Ph.D. Defense 29.11.2018 28 / 34

slide-34
SLIDE 34

Hardware cryptoprocessors for HECC

Comparisons with Best State of the Art Cryptoprocessors

◮ Ma13: ECC processor with generic primes by Ma et al. (2013) [4] ◮ Kop18a: µKummer-based HECC processor with very specific prime

by Koppermann et al. (2018) [3]

FPGA archi. ˜ w LUT FF logic DSP BRAM freq. time [k]P bits slices slices MHz ms Virtex-5 A2 34 783 1653 558 9 4 386 0.45 A4 34 1370 2953 1013 18 7 358 0.40 A3 136 2737 4978 1594 18 9 348 0.34 Ma13 336 4177 4792 1725 37 10 291 0.38 Zynq-7 A2 34 855 1619 463 9 4 347 0.50 A4 34 1475 3020 747 18 7 360 0.39 A3 136 3147 5033 1143 18 9 322 0.37 Kop18a 127 8764 6852 2657 49

  • 139

0.08

G.Gallin Ph.D. Defense 29.11.2018 29 / 34

slide-35
SLIDE 35

Conclusion and Perspectives

Summary

1

Introduction

2

HTMM – Hyper-Threaded Modular Multipliers

3

Hardware cryptoprocessors for HECC

4

Conclusion and Perspectives

G.Gallin Ph.D. Defense 29.11.2018 30 / 34

slide-36
SLIDE 36

Conclusion and Perspectives

Conclusion and Perspectives

◮ HTMM: flexible operators for Montgomery modular multiplication

◮ finely pipelined to compute several MMMs at the same time ◮ 128-bit HTMM is 2 × faster and smaller than best state of the art ◮ HTMM generator available online as open-source

◮ Flexible HECC cryptoprocessors and exploration tools

◮ TLM-inspired CCABA model and tools to explore architectures ◮ evaluation of architectures parameters impact on time vs. area tradeoffs ◮ prime P and curve parameters can be modified at run time

◮ HECC is more efficient than ECC in hardware

Perspectives

◮ Evaluate robustness of accelerators against physical attacks ◮ Explore other types of architectures (e.g. data-flow)

G.Gallin Ph.D. Defense 29.11.2018 31 / 34

slide-37
SLIDE 37

Conclusion and Perspectives

Ph.D. contributions I

Main contributions:

[GT18]

  • G. Gallin and A. Tisserand.

Generation of hyper-threaded GF(P ) multipliers for flexible curve based cryptography on FPGAs. submitted to IEEE Transactions on Computers (under major revision), 2018. [GCT17]

  • G. Gallin, T. O. Celik, and A. Tisserand.

Architecture level optimizations for Kummer based HECC on FPGAs. In Proc. 18th International Conference on Cryptology in India (Indocrypt), December 2017. [GT17a]

  • G. Gallin and A. Tisserand.

Hyper-threaded multiplier for HECC. In Proc. IEEE Asilomar Conference on Signals, Systems and Computers, October 2017.

Other conferences and workshops:

[GT17b]

  • G. Gallin and A. Tisserand.

Architecture level optimizations for Kummer based HECC on FPGAs. 15th International Workshop on cryptographic architectures embedded in logic devices (CryptArchi), June 2017. [GVT15a]

  • G. Gallin, N. Veyrat-Charvillon, and A. Tisserand.

Experimental comparison of crypto-processors architectures for elliptic and hyper-elliptic curves cryptography. 13th International Workshop on cryptographic architectures embedded in logic devices (CryptArchi), June 2015. [GVT15b]

  • G. Gallin, N. Veyrat-Charvillon, and A. Tisserand.

Comparaison exp´ erimentale d’architectures de crypto-processeurs pour courbes elliptiques et hyper-elliptiques. In Proc. Conf´ erence nationale d’informatique en Parall´ elisme, Architecture et Syst` eme (Compas), June 2015. best paper award for computer architecture track G.Gallin Ph.D. Defense 29.11.2018 32 / 34

slide-38
SLIDE 38

Conclusion and Perspectives

Ph.D. contributions II

Other talks and posters:

[Gal17]

  • G. Gallin.

Architectures mat´ erielles pour la cryptographie sur courbes hyper-elliptiques. S´ eminaire s´ ecurit´ e des syst` emes ´ electroniques embarqu´ es DGA – IRISA, December 2017. [inv. talk] [GT17b]

  • G. Gallin and A. Tisserand.

Finite field multiplier architectures for hyper-elliptic curve cryptography. 12` eme Colloque national du GDR SOC2, June 2017. [poster] [GT17c]

  • G. Gallin and A. Tisserand.

Hardware architectures exploration for hyper-elliptic curve cryptography. 6` eme Colloque national Crypto’Puces, June 2017. [talk] [GT16]

  • G. Gallin and A. Tisserand.

Hardware and arithmetic for hyperelliptic curves cryptography. Colloque annuel international du labex CominLabs, November 2016. [poster] [GT15]

  • G. Gallin and A. Tisserand.

Comparaison exp´ erimentale d’architectures de crypto-processeurs pour courbes elliptiques et hyper-elliptiques. Journ´ ees nationales Codage et Cryptographie (JC2), October 2015. [talk] [GVT15c]

  • G. Gallin, N. Veyrat-Charvillon, and A. Tisserand.

Hardware and arithmetic for hyperelliptic curves cryptography. Rencontres nationales Arithm´ etiques de l’Informatique Math´ ematique (RAIM), 2015. [poster] [GVT15d]

  • G. Gallin, N. Veyrat-Charvillon, and A. Tisserand.

Hardware and arithmetic for hyperelliptic curves cryptography. Colloque annuel international du labex CominLabs, March 2015. [poster] G.Gallin Ph.D. Defense 29.11.2018 33 / 34

slide-39
SLIDE 39

This work is funded by H-A-H project

Thank you for your attention

G.Gallin Ph.D. Defense 29.11.2018 34 / 34

slide-40
SLIDE 40

References

[1]

  • P. Gaudry.

Fast genus 2 arithmetic based on theta functions. Journal of Mathematical Cryptology, 1(3):243–265, August 2007. [2]

  • C. K. Koc, T. Acar, and B. S. Kaliski, Jr.

Analyzing and comparing Montgomery multiplication algorithms. IEEE Micro, 16(3):26–33, June 1996. [3]

  • P. Koppermann, F. De Santis, J. Heyszl, and G. Sigl.

Fast FPGA implementations of Diffie-Hellman on the Kummer surface of a genus-2 curve. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018(1):1–17, 2018. [4]

  • Y. Ma, Z. Liu, W. Pan, and J. Jing.

A high-speed elliptic curve cryptographic processor for generic curves over GF(p). In Proc. International Workshop on Selected Areas in Cryptography (SAC), volume 8282, pages 421–437, August 2013. [5]

  • P. L. Montgomery.

Modular multiplication without trial division.

  • Math. of Comp., 44(170):519–521, April 1985.

[6]

  • J. Renes, P. Schwabe, B. Smith, and L. Batina.

µKummer: Efficient hyperelliptic signatures and key exchange on microcontrollers. In Proc. 18th International Conference on Cryptographic Hardware and Embedded Systems (CHES), volume 9813, pages 301–320, August 2016. G.Gallin Ph.D. Defense 29.11.2018 35 / 34