Abstract
This paper intends to provide information about up-to-date performances of smart-card arithmetic coprocessors regarding major public-key cryptosystems and analyze the main tendences of this developing high-tech industry and related markets. We also comment hardware limitations of current technologies and provide a technique for extending them by virtually doubling their capacities.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Barrett, P.: Implementing the rivest shamir and adleman public key encryption algorithm on a standard digital signal processor. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 311–323. Springer, Heidelberg (1987)
de Waleffe, D., Quisquater, J.J.: CORSAIR, A Smart Card for Public-Key Cryptosystems. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 503–513. Springer, Heidelberg (1991)
Dhem, J.F.: Design of an Efficient Public-Key Cryptographic Library for RISCbased Smart Cards, PhD Thesis, UCL (1998)
Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Transactions on Information Theory IT-22(6), 644–654 (1976)
El-Gamal, T.: A Public-Key Cryptosystem and a Signature Scheme based on Discrete Logarithms. IEEE TIT IT-31(4), 469–472 (1985)
Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 181–187. Springer, Heidelberg (1987)
FIPS PUB 186, Digital Signature Standard (February 1, 1993)
Knuth, D.: The Art of Computer Programming. Seminumerical Algorithms 2, 248–250 (1969)
Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Advances in Cryptology: Crypto 1985, pp. 417–426. Springer, Heidelberg (1986)
Montgomery, P.: Modular Multiplication without Trial Division. Mathematics of Computations 44(170), 519–521 (1985)
Naccache, D., M’Raïhi, D.: Arithmetic Coprocessors for Public-Key Cryptography: The State of the Art. IEEE Micro, 14–24 (June 1996)
Omura, J.: A Public Key Cell Design for Smart Card Chips. In: IT Workshop, Hawaii, USA, November 27-30, pp. 983–985
Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public- Key Cryptosystems. Communications of the ACM 21(2), 120–126 (1978)
Schnorr, C.: Efficient identification and signatures for smart cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 239–252. Springer, Heidelberg (1990)
Sedlak, H.: The RSA Cryptographic Processor: The First High Speed One-Chip Solution. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 95–105. Springer, Heidelberg (1988)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Handschuh, H., Paillier, P. (2000). Smart Card Crypto-Coprocessors for Public-Key Cryptography. In: Quisquater, JJ., Schneier, B. (eds) Smart Card Research and Applications. CARDIS 1998. Lecture Notes in Computer Science, vol 1820. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10721064_35
Download citation
DOI: https://doi.org/10.1007/10721064_35
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67923-3
Online ISBN: 978-3-540-44534-0
eBook Packages: Springer Book Archive