{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T19:37:30Z","timestamp":1770838650894,"version":"3.50.1"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030652760","type":"print"},{"value":"9783030652777","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-65277-7_10","type":"book-chapter","created":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T12:17:34Z","timestamp":1607343454000},"page":"228-247","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Efficient Hardware Implementations for Elliptic Curve Cryptography over Curve448"],"prefix":"10.1007","author":[{"given":"Mojtaba","family":"Bisheh Niasar","sequence":"first","affiliation":[]},{"given":"Reza","family":"Azarderakhsh","sequence":"additional","affiliation":[]},{"given":"Mehran Mozaffari","family":"Kermani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Chen, L., Moody, D., Regenscheid, A., Randall, K.: Recommendations for discrete logarithm-based cryptography: elliptic curve domain parameters. In: Computer Security, Draft NIST Special Publication, National Institute of Standards and Technology, pp. 800\u2013186 (2019)","DOI":"10.6028\/NIST.SP.800-186-draft"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Langley, A., Hamburg, M., Turner, S.: Elliptic curves for security (2016)","DOI":"10.17487\/RFC7748"},{"key":"10_CR3","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: 35th Annual Symposium on Foundations of Computer Science, Santa Fe, New Mexico, USA, 20\u201322 November 1994, pp. 124\u2013134 (1994)"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Elkhatib, R., Azarderakhsh, R., Mozaffari Kermani, M.: Highly optimized montgomery multiplier for SIKE primes on FPGA. In: 27th IEEE Symposium on Computer Arithmetic, ARITH 2020, Portland, OR, USA, 7\u201310 June 2020, pp. 64\u201371 (2020)","DOI":"10.1109\/ARITH48897.2020.00018"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Seo, H., Sanal, P., Jalali, A., Azarderakhsh, R.: Optimized implementation of SIKE round 2 on 64-bit ARM cortex-a processors. IEEE Trans. Circuits Syst. I Regul. Pap. 67-I(8), 2659\u20132671 (2020)","DOI":"10.1109\/TCSI.2020.2979410"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Seo, H., Anastasova, M., Jalali, A., Azarderakhsh, R.: Supersingular isogeny key encapsulation (SIKE) round 2 on ARM cortex-m4. IACR Cryptol. ePrint Arch. 2020, 410 (2020)","DOI":"10.1109\/TC.2020.3023045"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Bindel, N., Herath, U., McKague, M., Stebila, D.: Transitioning to a quantum-resistant public key infrastructure. IACR Cryptology ePrint Archive 2017, 460 (2017)","DOI":"10.1007\/978-3-319-59879-6_22"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446 (2018)","DOI":"10.17487\/RFC8446"},{"key":"10_CR9","unstructured":"Hamburg, M.: Ed448-goldilocks, a new elliptic curve. IACR Cryptology ePrint Archive 2015, 625 (2015)"},{"key":"10_CR10","unstructured":"Hamburg, M.: Ed448-goldilocks, a new high-strength curve and implementation. https:\/\/csrc.nist.gov\/csrc\/media\/events\/workshop-on-elliptic-curve-cryptography-standards\/documents\/presentations\/session7-hamburg-michael.pdf. Accessed June 2015"},{"key":"10_CR11","unstructured":"Bernstein, D.J., Lange., T.: Safecurves: choosing safe curves for elliptic-curve cryptography (2016). https:\/\/safecurves.cr.yp.to\/"},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-319-05960-0_3","volume-title":"Reconfigurable Computing: Architectures, Tools, and Applications","author":"P Sasdrich","year":"2014","unstructured":"Sasdrich, P., G\u00fcneysu, T.: Efficient elliptic-curve cryptography using curve25519 on reconfigurable devices. In: Goehringer, D., Santambrogio, M.D., Cardoso, J.M.P., Bertels, K. (eds.) ARC 2014. LNCS, vol. 8405, pp. 25\u201336. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-05960-0_3"},{"issue":"4","key":"10_CR13","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/s41635-018-0048-z","volume":"2","author":"P Sasdrich","year":"2018","unstructured":"Sasdrich, P., G\u00fcneysu, T.: Exploring RFC 7748 for hardware implementation: curve25519 and curve448 with side-channel protection. J. Hardw. Syst. Secur. 2(4), 297\u2013313 (2018)","journal-title":"J. Hardw. Syst. Secur."},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Bisheh Niasar, M., Elkhatib, R., Azarderakhsh, R., Mozaffari Kermani, M.: Fast, small, and area-time efficient architectures for key-exchange on curve25519. In: 27th IEEE Symposium on Computer Arithmetic, ARITH 2020, Portland, OR, USA, 7\u201310 June 2020, pp. 72\u201379 (2020)","DOI":"10.1109\/ARITH48897.2020.00019"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Salarifard, R., Sarmadi, S.B.: An efficient low-latency point-multiplication over curve25519. IEEE Trans. Circuits Syst. 66-I(10), 3854\u20133862 (2019)","DOI":"10.1109\/TCSI.2019.2914247"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Sasdrich, P., G\u00fcneysu, T.: Cryptography for next generation TLS: implementing the RFC 7748 elliptic curve448 cryptosystem in hardware. In: Proceedings of the 54th Annual Design Automation Conference, DAC 2017, Austin, TX, USA, 18\u201322 June 2017, pp. 16:1\u201316:6 (2017)","DOI":"10.1145\/3061639.3062222"},{"issue":"4","key":"10_CR17","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1049\/iet-cdt.2019.0041","volume":"14","author":"YA Shah","year":"2020","unstructured":"Shah, Y.A., Javeed, K., Shehzad, M.I., Azmat, S.: LUT-based high-speed point multiplier for goldilocks-curve448. IET Comput. Digit. Tech. 14(4), 149\u2013157 (2020)","journal-title":"IET Comput. Digit. Tech."},{"key":"10_CR18","unstructured":"Bisheh Niasar, M., Azarderakhsh, R., Mozaffari Kermani, M.: Optimized architectures for elliptic curve cryptography over curve448. Cryptology ePrint Archive, Report 2020\/1338 (2020)"},{"key":"10_CR19","unstructured":"Ananyi, K., Alrimeih, H., Rakhmatov, D.: Flexible hardware processor for elliptic curve cryptography over NIST prime fields. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 17(8), 1099\u20131112 (2009)"},{"key":"10_CR20","unstructured":"Alrimeih, H., Rakhmatov, D.: Fast and flexible hardware support for ECC over multiple standard prime fields. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 22(12), 2661\u20132674 (2014)"},{"key":"10_CR21","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1090\/S0025-5718-1987-0866113-7","volume":"48","author":"PL Montgomery","year":"1987","unstructured":"Montgomery, P.L.: Speeding the pollard and elliptic curve methods of factorization. Math. Comput. 48, 243\u2013264 (1987)","journal-title":"Math. Comput."},{"key":"10_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume-title":"Cryptographic Hardware and Embedded Systems","author":"J-S Coron","year":"1999","unstructured":"Coron, J.-S.: Resistance against differential power analysis for elliptic curve cryptosystems. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 292\u2013302. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48059-5_25"},{"key":"10_CR23","unstructured":"Bisheh Niasar, M., Azarderakhsh, R., Mozaffari Kermani, M.: EdDSA for hardware implementation: highly optimized Ed25519 and Ed448 signatures. IEEE Trans. Circuits Syst. I: Reg. Pap. (2020, Accepted)"},{"key":"10_CR24","first-page":"595","volume":"7","author":"A Karatsuba","year":"1963","unstructured":"Karatsuba, A., Ofman, Y.: Multiplication of multidigit numbers on automata. Soviet physics doklady 7, 595 (1963)","journal-title":"Soviet physics doklady"},{"key":"10_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-642-03356-8_19","volume-title":"Advances in Cryptology - CRYPTO 2009","author":"DJ Bernstein","year":"2009","unstructured":"Bernstein, D.J.: Batch binary edwards. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 317\u2013336. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03356-8_19"},{"key":"10_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/978-3-662-44709-3_18","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2014","author":"DJ Bernstein","year":"2014","unstructured":"Bernstein, D.J., Chuengsatiansup, C., Lange, T.: Curve41417: Karatsuba revisited. In: Batina, L., Robshaw, M. (eds.) CHES 2014. LNCS, vol. 8731, pp. 316\u2013334. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44709-3_18"},{"key":"10_CR27","unstructured":"Schindler, W., Wiemers, A.: Efficient side-channel attacks on scalar blinding on elliptic curves with special structure. In: NIST Workshop on ECC Standards (2015)"},{"key":"10_CR28","unstructured":"Ogawa, H.S., et al.: Accelerated v2x provisioning with extensible processor platform. Cryptology ePrint Archive, Report 2019\/1039 (2019)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 INDOCRYPT 2020"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-65277-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,8]],"date-time":"2021-04-08T22:29:02Z","timestamp":1617920942000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-65277-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030652760","9783030652777"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-65277-7_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"8 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INDOCRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology in India","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"indocrypt2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/indocrypt2020.iiitb.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"84","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.0","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}