National Repository of Grey Literature 3 records found  Search took 0.00 seconds. 
Comparison of cryptographic primitives used in elliptic curve cryptograpny on different hardware platforms
Brychta, Josef ; Martinásek, Zdeněk (referee) ; Fujdiak, Radek (advisor)
This master thesis deals with the implementation of variants of cryptographic libraries containing primitives for elliptic curves. By creating custom metering charts to compare each implementation. The main task was not only the implementation of libraries but also the design and implementation of test scenarios together with the creation of measurement methods for different libraries and hardware platforms. As a result, a number of experimental tests were conducted on different curves and their parameters so that the results of the work included complex problems of elliptic curves in cryptography. The main parameters were power, time and memory consumption.
Benchmarks With Points On Elliptic Curves
Brychta, Josef
This paper deals with benchmarks of generating random points and arithmetic operations with points on elliptic curves. These benchmarks were implemented on the hardware platforms Raspberry Pi Zero/1/2/3. The primary goal was to measure usage of the system resources and energetic consumption of that hardware platform. Specifically, it was memory and time consumption of Raspberry. In total, 48 elliptic curves of standards NIST, BRAINPOOL, GOST and FRP were measured.
Comparison of cryptographic primitives used in elliptic curve cryptograpny on different hardware platforms
Brychta, Josef ; Martinásek, Zdeněk (referee) ; Fujdiak, Radek (advisor)
This master thesis deals with the implementation of variants of cryptographic libraries containing primitives for elliptic curves. By creating custom metering charts to compare each implementation. The main task was not only the implementation of libraries but also the design and implementation of test scenarios together with the creation of measurement methods for different libraries and hardware platforms. As a result, a number of experimental tests were conducted on different curves and their parameters so that the results of the work included complex problems of elliptic curves in cryptography. The main parameters were power, time and memory consumption.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.