Secure Evolutionary Hardware for Public-Key Cryptosystems
Created by W.Langdon from
gp-bibliography.bib Revision:1.8051
- @InProceedings{nedjah:2004:sehfpc,
-
title = "Secure Evolutionary Hardware for Public-Key
Cryptosystems",
-
author = "Nadia Nedjah and Luiza Mourelle",
-
pages = "2130--2137",
-
booktitle = "Proceedings of the 2004 IEEE Congress on Evolutionary
Computation",
-
year = "2004",
-
publisher = "IEEE Press",
-
month = "20-23 " # jun,
-
address = "Portland, Oregon",
-
ISBN = "0-7803-8515-2",
-
keywords = "genetic algorithms, genetic programming, Evolutionary
Computation in Cryptology and Computer Security,
Evolutionary design \& evolvable hardware, Evolutionary
Design Automation",
-
DOI = "doi:10.1109/CEC.2004.1331160",
-
abstract = "Genetic programming is used as an alternative
methodology to automatically generate secure and
minimal hardware designs of public-key cryptosystems
such as RSA encryption system. We evolve optimal
hardware circuits for modular exponentiation, which a
cornerstone operation in almost every cryptographic
system. The evolved circuits minimize both space (i.e.
required gate number) and time (i.e. encryption and
decryption time). The evolved designs are shielded
against side-channel leakage and hence secure. The
structure of the cryptographic circuit is random and so
the private key cannot be deduced using known attacks.
We compare our results against existing well-known
designs which were produced by human designers based on
the binary method.",
-
notes = "CEC 2004 - A joint meeting of the IEEE, the EPS, and
the IEE.",
- }
Genetic Programming entries for
Nadia Nedjah
Luiza de Macedo Mourelle
Citations