Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Secure ECDSA SRAM-PUF Based on Universal Single/Double Scalar Multiplication Architecture
by
Dang, Hua
, Li, Xiangnan
, He, Xiang
, Chen, Zhiming
, Zhang, Jingqi
, Hao, Yue
, Liu, Kuanhao
, Wang, Weijiang
, Ma, Mingzhi
in
Algorithms
/ Application specific integrated circuits
/ Bit error rate
/ Cloning
/ Codes
/ Computer architecture
/ Cryptography
/ Curves
/ Custom integrated circuits
/ Cybersecurity
/ Data security
/ Digital integrated circuits
/ Digital signatures
/ elliptic curve digital signature algorithm
/ elliptic curve double scalar multiplication
/ elliptic curve scalar multiplication
/ Error correction
/ Error correction & detection
/ Error-correcting codes
/ Field programmable gate arrays
/ Integrated circuits
/ Memory (Computers)
/ Multiplication
/ Random access memory
/ Registration
/ Safety and security measures
/ Software
/ SRAM-PUF
/ Static random access memory
2024
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Secure ECDSA SRAM-PUF Based on Universal Single/Double Scalar Multiplication Architecture
by
Dang, Hua
, Li, Xiangnan
, He, Xiang
, Chen, Zhiming
, Zhang, Jingqi
, Hao, Yue
, Liu, Kuanhao
, Wang, Weijiang
, Ma, Mingzhi
in
Algorithms
/ Application specific integrated circuits
/ Bit error rate
/ Cloning
/ Codes
/ Computer architecture
/ Cryptography
/ Curves
/ Custom integrated circuits
/ Cybersecurity
/ Data security
/ Digital integrated circuits
/ Digital signatures
/ elliptic curve digital signature algorithm
/ elliptic curve double scalar multiplication
/ elliptic curve scalar multiplication
/ Error correction
/ Error correction & detection
/ Error-correcting codes
/ Field programmable gate arrays
/ Integrated circuits
/ Memory (Computers)
/ Multiplication
/ Random access memory
/ Registration
/ Safety and security measures
/ Software
/ SRAM-PUF
/ Static random access memory
2024
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Secure ECDSA SRAM-PUF Based on Universal Single/Double Scalar Multiplication Architecture
by
Dang, Hua
, Li, Xiangnan
, He, Xiang
, Chen, Zhiming
, Zhang, Jingqi
, Hao, Yue
, Liu, Kuanhao
, Wang, Weijiang
, Ma, Mingzhi
in
Algorithms
/ Application specific integrated circuits
/ Bit error rate
/ Cloning
/ Codes
/ Computer architecture
/ Cryptography
/ Curves
/ Custom integrated circuits
/ Cybersecurity
/ Data security
/ Digital integrated circuits
/ Digital signatures
/ elliptic curve digital signature algorithm
/ elliptic curve double scalar multiplication
/ elliptic curve scalar multiplication
/ Error correction
/ Error correction & detection
/ Error-correcting codes
/ Field programmable gate arrays
/ Integrated circuits
/ Memory (Computers)
/ Multiplication
/ Random access memory
/ Registration
/ Safety and security measures
/ Software
/ SRAM-PUF
/ Static random access memory
2024
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Secure ECDSA SRAM-PUF Based on Universal Single/Double Scalar Multiplication Architecture
Journal Article
Secure ECDSA SRAM-PUF Based on Universal Single/Double Scalar Multiplication Architecture
2024
Request Book From Autostore
and Choose the Collection Method
Overview
Physically unclonable functions (PUFs) are crucial for enhancing cybersecurity by providing unique, intrinsic identifiers for electronic devices, thus ensuring their authenticity and preventing unauthorized cloning. The SRAM-PUF, characterized by its simple structure and ease of implementation in various scenarios, has gained widespread usage. The soft-decision Reed–Muller (RM) code, an error correction code, is commonly employed in these designs. This paper introduces the design of an RM code soft-decision attack algorithm to reveal its potential security risks. To address this problem, we propose a soft-decision SRAM-PUF structure based on the elliptic curve digital signature algorithm (ECDSA). To improve the processing speed of the proposed secure SRAM-PUF, we propose a custom ECDSA scheme. Further, we also propose a universal architecture for the critical operations in ECDSA, elliptic curve scalar multiplication (ECSM), and elliptic curve double scalar multiplication (ECDSM) based on the differential addition chain (DAC). For ECSMs, iterations can be performed directly; for ECDSMs, a two-dimensional DAC is constructed through precomputation, followed by iterations. Moreover, due to the high similarity of ECSM and ECDSM data paths, this universal architecture saves hardware resources. Our design is implemented on a field-programmable gate array (FPGA) and an application-specific integrated circuit (ASIC) using a Xilinx Virtex-7 and an TSMC 40 nm process. Compared to existing research, our design exhibits a lower bit error rate (2.7×10−10) and better area–time performance (3902 slices, 6.615 μs ECDSM latency).
Publisher
MDPI AG
Subject
/ Application specific integrated circuits
/ Cloning
/ Codes
/ Curves
/ elliptic curve digital signature algorithm
/ elliptic curve double scalar multiplication
/ elliptic curve scalar multiplication
/ Error correction & detection
/ Field programmable gate arrays
/ Safety and security measures
/ Software
/ SRAM-PUF
This website uses cookies to ensure you get the best experience on our website.