Key research themes
1. How can Binary Edwards Curves (BEC) be efficiently implemented on resource-constrained hardware with resistance to side-channel attacks?
This theme addresses designing hardware architectures for Binary Edwards Curves that optimize point multiplication computations in terms of latency, area, and security. BECs are favored for their unified formulas that inherently resist simple power analysis (SPA) attacks, making them suitable for IoT and embedded devices. Research focuses on pipeline architectures, low-complexity finite field multipliers, and radix-based multiplier units to expedite elliptic curve point multiplication while minimizing resource usage and enhancing side-channel attack mitigation.
2. What algorithmic and architectural strategies improve performance and flexibility of hardware elliptic curve cryptography processors supporting multiple curve forms including Edwards and Weierstrass curves?
This theme explores unified hardware designs capable of supporting diverse elliptic curve forms (Weierstrass, Edwards, and Huff) on FPGA platforms. Achieving trade-offs between area, speed, and security involves modular arithmetic optimizations, efficient storage, and flexible point multiplication algorithms such as Montgomery ladder and Double-and-Add. The goal is to attain high-performance, low-area cryptographic modules adaptable to varying security requirements and resistant to side-channel attacks.
3. How can isogenies and curve transformations among Edwards, Hessian, and other curve forms optimize elliptic curve cryptographic operations?
Research in this theme focuses on deriving explicit formulas for isogenies on different elliptic curve models beyond the classical Weierstrass form, particularly twisted Hessian and Edwards curves. By obtaining minimal operation counts for kernel and input point processing, these transformations facilitate faster computations, potential reductions in side-channel vulnerability, and novel cryptographic protocol constructions, thereby expanding the flexibility and efficiency of elliptic curve cryptography implementations.