{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:57:09Z","timestamp":1740149829137,"version":"3.37.3"},"reference-count":18,"publisher":"Wiley","license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["International Journal of Reconfigurable Computing"],"published-print":{"date-parts":[[2012]]},"abstract":"<jats:p>Elliptic curve cryptography (ECC) has become a popular public key cryptography standard. The security of ECC is due to the difficulty of solving the elliptic curve discrete logarithm problem (ECDLP). In this paper, we demonstrate a successful attack on ECC over prime field using the Pollard rho algorithm implemented on a hardware-software cointegrated platform. We propose a high-performance architecture for multiplication over prime field using specialized DSP blocks in the FPGA. We characterize this architecture by exploring the design space to determine the optimal integer basis for polynomial representation and we demonstrate an efficient mapping of this design to multiple standard prime field elliptic curves. We use the resulting modular multiplier to demonstrate low-latency multiplications for curves secp112r1 and P-192. We apply our modular multiplier to implement a complete attack on secp112r1 using a Nallatech FSB-Compute platform with Virtex-5 FPGA. The measured performance of the resulting design is 114 cycles per Pollard rho step at 100\u2009MHz, which gives 878\u2009K iterations per second per ECC core. We extend this design to a multicore ECDLP implementation that achieves 14.05\u2009M iterations per second with 16 parallel point addition cores.<\/jats:p>","DOI":"10.1155\/2012\/439021","type":"journal-article","created":{"date-parts":[[2012,11,28]],"date-time":"2012-11-28T16:25:23Z","timestamp":1354119923000},"page":"1-14","source":"Crossref","is-referenced-by-count":5,"title":["A Hardware-Accelerated ECDLP with High-Performance Modular Multiplication"],"prefix":"10.1155","volume":"2012","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6596-1000","authenticated-orcid":true,"given":"Lyndon","family":"Judge","sequence":"first","affiliation":[{"name":"Bradley Department of Electrical and Computer Engineering, Center for Embedded Systems for Critical Applications (CESCA), Virginia Tech, Blacksburg, VA 24061, USA"}]},{"given":"Suvarna","family":"Mane","sequence":"additional","affiliation":[{"name":"Bradley Department of Electrical and Computer Engineering, Center for Embedded Systems for Critical Applications (CESCA), Virginia Tech, Blacksburg, VA 24061, USA"}]},{"given":"Patrick","family":"Schaumont","sequence":"additional","affiliation":[{"name":"Bradley Department of Electrical and Computer Engineering, Center for Embedded Systems for Critical Applications (CESCA), Virginia Tech, Blacksburg, VA 24061, USA"}]}],"member":"311","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39799-X_31"},{"issue":"177","key":"14","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","year":"1987","journal-title":"Mathematics of Computation"},{"year":"2005","series-title":"London Mathematical Society Lecture Note Series","key":"4"},{"issue":"143","key":"22","first-page":"918","volume":"32","year":"1978","journal-title":"Mathematics of Computation"},{"issue":"1","key":"26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/PL00003816","volume":"12","year":"1999","journal-title":"Journal of Cryptology"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-00-01213-8"},{"key":"24","series-title":"Lecture Notes in Computer Science","volume-title":"Speeding up Pollard\u2019s rho method for computing discrete logarithms","volume":"1423","year":"1998"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/BF01933190"},{"key":"5","series-title":"Lecture Notes in Computer Science","volume-title":"ECC2K-130 on cell CPUs","volume":"6055","year":"2010"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17401-8_23"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19379-8_8"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/11894063_9"},{"issue":"2","key":"12","first-page":"8:1","volume":"1","year":"2008","journal-title":"ACM Transactions on Reconfigurable Technology and Systems"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_26"},{"issue":"3","key":"7","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1504\/IJACT.2012.045590","volume":"2","year":"2012","journal-title":"International Journal of Applied Cryptography"},{"issue":"177","key":"20","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1090\/S0025-5718-1987-0866113-7","volume":"48","year":"1987","journal-title":"Mathematics of Computation"},{"year":"2004","key":"13"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85053-3_5"}],"container-title":["International Journal of Reconfigurable Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijrc\/2012\/439021.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijrc\/2012\/439021.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijrc\/2012\/439021.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T23:14:11Z","timestamp":1498000451000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.hindawi.com\/journals\/ijrc\/2012\/439021\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"references-count":18,"alternative-id":["439021","439021"],"URL":"https:\/\/doi.org\/10.1155\/2012\/439021","relation":{},"ISSN":["1687-7195","1687-7209"],"issn-type":[{"type":"print","value":"1687-7195"},{"type":"electronic","value":"1687-7209"}],"subject":[],"published":{"date-parts":[[2012]]}}}