BPAP: FPGA Design of a RISC-like Processor for Elliptic Curve Cryptography Using Task-Level Parallel Programming in High-Level Synthesis

Popular technologies such as blockchain and zero-knowledge proof, which have already entered the enterprise space, heavily use cryptography as the core of their protocol stack. One of the most used systems in this regard is Elliptic Curve Cryptography, precisely the point multiplication operation, w...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Cryptography Jg. 9; H. 1; S. 20
Hauptverfasser: Ifrim, Rares, Popescu, Decebal
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Basel MDPI AG 01.03.2025
Schlagworte:
ISSN:2410-387X, 2410-387X
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract Popular technologies such as blockchain and zero-knowledge proof, which have already entered the enterprise space, heavily use cryptography as the core of their protocol stack. One of the most used systems in this regard is Elliptic Curve Cryptography, precisely the point multiplication operation, which provides the security assumption for all applications that use this system. As this operation is computationally intensive, one solution is to offload it to specialized accelerators to provide better throughput and increased efficiency. In this paper, we explore the use of Field Programmable Gate Arrays (FPGAs) and the High-Level Synthesis framework of AMD Vitis in designing an elliptic curve point arithmetic unit (point adder) for the secp256k1 curve. We show how task-level parallel programming and data streaming are used in designing a RISC processor-like architecture to provide pipeline parallelism and increase the throughput of the point adder unit. We also show how to efficiently use the proposed processor architecture by designing a point multiplication scheduler capable of scheduling multiple batches of elliptic curve points to utilize the point adder unit efficiently. Finally, we evaluate our design on an AMD-Xilinx Alveo-family FPGA and show that our point arithmetic processor has better throughput and frequency than related work.
AbstractList Popular technologies such as blockchain and zero-knowledge proof, which have already entered the enterprise space, heavily use cryptography as the core of their protocol stack. One of the most used systems in this regard is Elliptic Curve Cryptography, precisely the point multiplication operation, which provides the security assumption for all applications that use this system. As this operation is computationally intensive, one solution is to offload it to specialized accelerators to provide better throughput and increased efficiency. In this paper, we explore the use of Field Programmable Gate Arrays (FPGAs) and the High-Level Synthesis framework of AMD Vitis in designing an elliptic curve point arithmetic unit (point adder) for the secp256k1 curve. We show how task-level parallel programming and data streaming are used in designing a RISC processor-like architecture to provide pipeline parallelism and increase the throughput of the point adder unit. We also show how to efficiently use the proposed processor architecture by designing a point multiplication scheduler capable of scheduling multiple batches of elliptic curve points to utilize the point adder unit efficiently. Finally, we evaluate our design on an AMD-Xilinx Alveo-family FPGA and show that our point arithmetic processor has better throughput and frequency than related work.
Audience Academic
Author Popescu, Decebal
Ifrim, Rares
Author_xml – sequence: 1
  givenname: Rares
  orcidid: 0000-0002-3915-0458
  surname: Ifrim
  fullname: Ifrim, Rares
– sequence: 2
  givenname: Decebal
  orcidid: 0000-0003-3921-5343
  surname: Popescu
  fullname: Popescu, Decebal
BookMark eNp9Udtq3DAQNSGFpEm-oC-CPjuVLNuS-rZ1c1lYqGkS6JsZy2OvNl7LlbyB_YN-duRsKKGEIoRGR-cyYj5Gx4MdMIo-MXrJuaJftNuPk-0cjOu9oozShB5Fp0nKaMyl-HX8pj6JLrzf0JkihRTqNPrzrVyUX8l1ebMg39GbbiC2JUB-Lu-KuDePSEpnNXpvHWnDvup7M05Gk2LnnpAUb7LJgzdDR-7BP8YrfMKelOCg7-fCzZztdn43A7k13fqVcrcfpnXI9efRhxZ6jxev51n0cH11X9zGqx83y2KxinWaqClmXIGoM0xA0EwIyDKepznjdUJRqKZRmWhRqpZLEDrgiQw3zOsgqhOlan4WLQ--jYVNNTqzBbevLJjqBbCuq8CFD_ZYNbVOa2QZ5hpSYFhLKajIeU0Fcsmb4PX54DU6-3uHfqo2dueG0H7FmWRpInKZBtblgdVBMDVDaycHOqwGt0aHWbYm4AvJeUZTKrMg4AeBdtZ7h-3fNhmt5pFX74w8qNQ_Km0mmIwdQpzp_6t9BjVZt7k
CitedBy_id crossref_primary_10_3390_cryptography9030058
Cites_doi 10.1007/978-3-031-46573-4_28
10.1117/12.2675431
10.46586/tches.v2020.i4.189-208
10.3390/en16031510
10.1109/MNET.011.2000473
10.1007/978-3-642-01001-9
10.2139/ssrn.3367674
10.20944/preprints202101.0250.v1
10.1109/TCAD.2015.2513673
10.1007/s102070100002
10.1109/ICAICTA.2015.7335349
10.1145/3595647.3595650
10.1145/3530775
10.1109/TC.2020.3013266
10.1007/978-1-4419-5906-5_245
10.1109/ACCESS.2021.3129314
10.1007/978-981-99-7666-9_9
10.1145/3289602.3293912
10.1109/PST.2017.00050
10.1016/j.sbspro.2015.06.420
10.1109/MSSC.2018.2822862
10.1007/s13389-014-0084-8
10.1109/ASAP54787.2022.00032
10.6028/NIST.SP.800-78-5.ipd
ContentType Journal Article
Copyright COPYRIGHT 2025 MDPI AG
2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: COPYRIGHT 2025 MDPI AG
– notice: 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID AAYXX
CITATION
8FE
8FG
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
HCIFZ
P5Z
P62
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
DOA
DOI 10.3390/cryptography9010020
DatabaseName CrossRef
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
ProQuest Technology Collection
ProQuest One
ProQuest Central Korea
SciTech Premium Collection
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic (New)
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Publicly Available Content Database
Advanced Technologies & Aerospace Collection
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest One Academic Eastern Edition
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Central China
ProQuest Central
Advanced Technologies & Aerospace Database
ProQuest One Applied & Life Sciences
ProQuest One Academic UKI Edition
ProQuest Central Korea
ProQuest Central (New)
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList

CrossRef
Publicly Available Content Database
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: PIMPY
  name: Publicly Available Content Database
  url: http://search.proquest.com/publiccontent
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2410-387X
ExternalDocumentID oai_doaj_org_article_dbc4be15e6ca4a1eb8870763b07e383d
A833504085
10_3390_cryptography9010020
GeographicLocations Romania
GeographicLocations_xml – name: Romania
GroupedDBID 8FE
8FG
AADQD
AAYXX
ADBBV
AFFHD
AFKRA
AFZYC
ALMA_UNASSIGNED_HOLDINGS
ARAPS
BCNDV
BENPR
BGLVJ
CCPQU
CITATION
GROUPED_DOAJ
HCIFZ
IAO
ITC
MODMG
M~E
OK1
P62
PHGZM
PHGZT
PIMPY
PQGLB
PROAC
ABUWG
AZQEC
DWQXO
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
ID FETCH-LOGICAL-c429t-139a7b5e2a70577a55364613b20e79dd957fe89f38a7c61328e89e6ba7bb299b3
IEDL.DBID DOA
ISICitedReferencesCount 1
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001451960300001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2410-387X
IngestDate Fri Oct 03 12:38:57 EDT 2025
Fri Jul 25 21:16:42 EDT 2025
Sat Nov 29 10:33:29 EST 2025
Sat Nov 29 07:19:35 EST 2025
Tue Nov 18 21:55:29 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c429t-139a7b5e2a70577a55364613b20e79dd957fe89f38a7c61328e89e6ba7bb299b3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-3921-5343
0000-0002-3915-0458
OpenAccessLink https://doaj.org/article/dbc4be15e6ca4a1eb8870763b07e383d
PQID 3181427684
PQPubID 2055420
ParticipantIDs doaj_primary_oai_doaj_org_article_dbc4be15e6ca4a1eb8870763b07e383d
proquest_journals_3181427684
gale_infotracacademiconefile_A833504085
crossref_primary_10_3390_cryptography9010020
crossref_citationtrail_10_3390_cryptography9010020
PublicationCentury 2000
PublicationDate 2025-03-01
PublicationDateYYYYMMDD 2025-03-01
PublicationDate_xml – month: 03
  year: 2025
  text: 2025-03-01
  day: 01
PublicationDecade 2020
PublicationPlace Basel
PublicationPlace_xml – name: Basel
PublicationTitle Cryptography
PublicationYear 2025
Publisher MDPI AG
Publisher_xml – name: MDPI AG
References ref_13
Cong (ref_16) 2022; 15
Eyupoglu (ref_25) 2015; 195
ref_19
Kapoor (ref_7) 2008; 9
ref_18
Johnson (ref_11) 2001; 1
ref_17
Bernaca (ref_2) 2021; 9
Bos (ref_12) 2014; 4
Hamburg (ref_28) 2020; 2020
ref_24
ref_23
ref_22
ref_21
ref_1
ref_3
Sun (ref_10) 2021; 35
ref_27
Nane (ref_15) 2015; 35
ref_26
ref_9
ref_8
Mehrabi (ref_20) 2020; 69
ref_5
ref_4
Trimberger (ref_14) 2018; 10
ref_6
References_xml – ident: ref_22
  doi: 10.1007/978-3-031-46573-4_28
– ident: ref_1
  doi: 10.1117/12.2675431
– ident: ref_9
– volume: 9
  start-page: 1
  year: 2008
  ident: ref_7
  article-title: Elliptic curve cryptography
  publication-title: ACM Ubiquity
– volume: 2020
  start-page: 189
  year: 2020
  ident: ref_28
  article-title: Faster Montgomery and double-add ladders for short Weierstrass curves
  publication-title: IACR Trans. Cryptogr. Hardw. Embed. Syst.
  doi: 10.46586/tches.v2020.i4.189-208
– ident: ref_24
– ident: ref_4
  doi: 10.3390/en16031510
– volume: 35
  start-page: 198
  year: 2021
  ident: ref_10
  article-title: A survey on zero-knowledge proof in blockchain
  publication-title: IEEE Netw.
  doi: 10.1109/MNET.011.2000473
– ident: ref_27
  doi: 10.1007/978-3-642-01001-9
– ident: ref_5
  doi: 10.2139/ssrn.3367674
– ident: ref_18
  doi: 10.20944/preprints202101.0250.v1
– volume: 35
  start-page: 1591
  year: 2015
  ident: ref_15
  article-title: A survey and evaluation of FPGA high-level synthesis tools
  publication-title: IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst.
  doi: 10.1109/TCAD.2015.2513673
– volume: 1
  start-page: 36
  year: 2001
  ident: ref_11
  article-title: The elliptic curve digital signature algorithm (ECDSA)
  publication-title: Int. J. Inf. Secur.
  doi: 10.1007/s102070100002
– ident: ref_13
  doi: 10.1109/ICAICTA.2015.7335349
– ident: ref_6
  doi: 10.1145/3595647.3595650
– volume: 15
  start-page: 51
  year: 2022
  ident: ref_16
  article-title: FPGA HLS Today: Successes, Challenges, and Opportunities
  publication-title: ACM Trans. Reconfigurable Technol. Syst.
  doi: 10.1145/3530775
– ident: ref_23
– volume: 69
  start-page: 1707
  year: 2020
  ident: ref_20
  article-title: Elliptic curve cryptography point multiplication core for hardware security module
  publication-title: IEEE Trans. Comput.
  doi: 10.1109/TC.2020.3013266
– ident: ref_8
  doi: 10.1007/978-1-4419-5906-5_245
– volume: 9
  start-page: 156729
  year: 2021
  ident: ref_2
  article-title: Verifiable computing applications in blockchain
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3129314
– ident: ref_21
  doi: 10.1007/978-981-99-7666-9_9
– ident: ref_26
  doi: 10.1145/3289602.3293912
– ident: ref_17
  doi: 10.1109/PST.2017.00050
– volume: 195
  start-page: 1860
  year: 2015
  ident: ref_25
  article-title: Performance analysis of karatsuba multiplication algorithm for different bit lengths
  publication-title: Procedia-Soc. Behav. Sci.
  doi: 10.1016/j.sbspro.2015.06.420
– volume: 10
  start-page: 16
  year: 2018
  ident: ref_14
  article-title: Three Ages of FPGAs: A Retrospective on the First Thirty Years of FPGA Technology: This Paper Reflects on How Moore’s Law Has Driven the Design of FPGAs Through Three Epochs: The Age of Invention, the Age of Expansion, and the Age of Accumulation
  publication-title: IEEE Solid-State Circuits Mag.
  doi: 10.1109/MSSC.2018.2822862
– volume: 4
  start-page: 275
  year: 2014
  ident: ref_12
  article-title: Constant time modular inversion
  publication-title: J. Cryptogr. Eng.
  doi: 10.1007/s13389-014-0084-8
– ident: ref_19
  doi: 10.1109/ASAP54787.2022.00032
– ident: ref_3
  doi: 10.6028/NIST.SP.800-78-5.ipd
SSID ssj0002087879
Score 2.2914875
Snippet Popular technologies such as blockchain and zero-knowledge proof, which have already entered the enterprise space, heavily use cryptography as the core of...
SourceID doaj
proquest
gale
crossref
SourceType Open Website
Aggregation Database
Enrichment Source
Index Database
StartPage 20
SubjectTerms Arithmetic and logic units
Blockchain
C plus plus
Computer architecture
Cryptography
Curves
Data security
Data transmission
Design
Design and construction
Digital integrated circuits
Digital signatures
ECC
Field programmable gate arrays
finite field multiplication
FPGA
High level synthesis
Methods
Microprocessors
Multiplication
Multiplication & division
Parallel programming
Pipelining (computers)
point multiplication
Prime numbers
RISC
SummonAdditionalLinks – databaseName: Advanced Technologies & Aerospace Database
  dbid: P5Z
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Nb9QwEB1B4cCF8ikWCpoDEhesZp0PJ1zQdmEBqaoiWqSKi2U7TrXqkizJtlL_AT-bmax36QF64RQltiNHHs-Mnef3AF7XMssrWh-LOiu8oHicCJOqWBgTx5lR1ViueWYP1dFRfnpalGHDrQ-wyo1PHBx11TreI98n2xsnkn8bvV_-FKwaxX9Xg4TGbbjDLAks3VCm37d7LDLKyR6LNdlQTKv7fdddLVeBC5qBCRHrfF8LSANv_7-88xByZrv_29kHcD8kmzhZW8dDuOWbR7C7EXLAMK8fw6-DclK-w1n5aYIfBkgHtjUa_PrleCoW83OP4TxB2yEluchAD3I1DqcX3aXH6bXPxQGDgCemPxeHDEjC0nSs17LgdzAU7AeXzxtkhEmocnzVUB7az_sn8G328WT6WQSJBuEokLGQfWGUTb00ihI_ZdI0zhLKEKyMvCqqqkhV7fOijnOjHD2XOd35zFIjS4HQxk9hp2kb_wwwcQmloi5SUhZ0SU1iJB-N8Bm9orJyBHIzTtoF_nKW0VhoWsfw4Oq_DO4I3m4bLdf0HTdXP2AD2FZl7u3hQdud6TCVdWVdYv2YOuaoj2NvyU-Ttcc2Up7W-9UI3rD5aPYQ1EFnwkEH-kzm2tITPucWMbPcCPY25qOD6-j1H9t5fnPxC7gnWYx4AMTtwc6qu_Av4a67XM377tUwE34D0HsUTw
  priority: 102
  providerName: ProQuest
Title BPAP: FPGA Design of a RISC-like Processor for Elliptic Curve Cryptography Using Task-Level Parallel Programming in High-Level Synthesis
URI https://www.proquest.com/docview/3181427684
https://doaj.org/article/dbc4be15e6ca4a1eb8870763b07e383d
Volume 9
WOSCitedRecordID wos001451960300001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2410-387X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002087879
  issn: 2410-387X
  databaseCode: DOA
  dateStart: 20170101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2410-387X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002087879
  issn: 2410-387X
  databaseCode: M~E
  dateStart: 20170101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVPQU
  databaseName: Advanced Technologies & Aerospace Database
  customDbUrl:
  eissn: 2410-387X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002087879
  issn: 2410-387X
  databaseCode: P5Z
  dateStart: 20170601
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/hightechjournals
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 2410-387X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002087879
  issn: 2410-387X
  databaseCode: BENPR
  dateStart: 20170601
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Publicly Available Content Database
  customDbUrl:
  eissn: 2410-387X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002087879
  issn: 2410-387X
  databaseCode: PIMPY
  dateStart: 20170601
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/publiccontent
  providerName: ProQuest
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwELZQ4cAFKA-xtFRzQOJC1KzzcNzb7tJtK5WV1RapcLFsx5GWLtkq2VbqP-BnM5N4qz1QuHBJFMexHM_YMyN__oaxDxXPixLj46jKpY_QHqeRyUQSGZMkuRHlkPc8s6diNisuL6XaSPVFmLCeHrgfuP3SutT6YeZzZ1Iz9BZnBbad2Fh4jK5KWn1jITeCqR_d9lqBmih7mqEE4_p919xdrwILNEESYsrwvWGKOsb-h9blzthMX7BnwUuEUd-7bfbI1y_Z83UGBggT8hX7NVYjdQBTdTSCzx0WA5YVGDg7OZ9Ei_mVh3AQYNkAeqdACA1cIxxMbppbD5ON3kIHHoAL015Fp4QkAmUaSrSyoDYIw_WT3s9rIGhIqHJ-V6MD2c7b1-zr9PBichyF3AqRQwtEGeilETbz3Aj02ITJsiRP0bRbHnshy1JmovKFrJLCCIflvMAnn1v8yKIFs8kbtlUva_-WQepS9CFdLDiXeMtQTJzONPgcmygtHzC-HmbtAvE45b9YaAxASDb6D7IZsE_3H133vBt_rz4m-d1XJdLsrgBVSQdV0v9SpQH7SNLXNLWxg86EEwr4m0SSpUd0QC0mSrgB210riA5zvtW4Og5TThub7_5Hb3bYU065hju82y7bWjU3_j174m5X87bZY4_HhzN1ttepPV5V9h3L1MkX9e03dtYLPw
linkProvider Directory of Open Access Journals
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Nb9NAEB2VFAkulE8RKLAHEBesOru210ZCKE0JjZpGFg1SezLr9aaKmtrBTovyD_g1_EZmnHXoAXrrgZNle73abN7OzNpv5gG8nvAgzHB_7EyCyDjojz1H-VI4SgkRKJl1-KrO7FCORuHxcRRvwK8mF4ZolY1NrA11Vmh6R76D2Ot4nD4bfZx_d0g1ir6uNhIaK1gcmOUP3LJVHwZ7-P--4bz_adzbd6yqgKPR9pL2eqRk6huuJMYqUvm-CDx0ail3jYyyLPLlxITRRIRKarzOQzwzQYoPpWi7U4H93oJNj8Degs14cBifrN_qcDfEFRCtyhsJEbk7ulzOF7b6NFEhXFIWv-ICa6WAf_mD2sn1t_636bkP92w4zbor_D-ADZM_hK1GqoJZy_UIfu7G3fg968efu2yvJq2wYsIU-zI46jmz6ZlhNmOiKBmG8YyoLGhMNetdlJeG9a5ML6tZFmysqjNnSJQrFquSFGlm1AeR3c7p_jRnxKGxTY6WOUba1bR6DF9vZD6eQCsvcvMUmKc9DLa1KzmP8OArT3FK_jABdpGlvA28wUWibYV2EgqZJbhTIzAlfwFTG96tH5qvCpRc33yXALduStXF6wtFeZpYY5VkqfZS08GBaRxjx6ToiXA9i9SVRoQia8NbgmtCNhAHqJVN5cCfSdXEki5l8rlUO68N2w1cE2scq-QPVp9df_sV3NkfHw6T4WB08BzucpJerul_29BalBfmBdzWl4tpVb6065DBt5vG9m_H-XEY
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V3Pb9MwFLbGQIgL46foGOADiAtRUzuJEySEupZCtaqK2JAmLp7tOKhal5SkG-p_wN_EX8d7qVN2gN124BQlcSzX_fzec_K99xHyMmdRnMH-2MujxHrgjwNPhYJ7SnEeKZH12LrO7ERMp_HxcZJukV9tLgzSKlub2BjqrDT4jrwL2OsFDD8bdXNHi0iHo_eL7x4qSOGX1lZOYw2RA7v6Adu3-t14CP_1K8ZGH44GnzynMOAZsMOow54ooUPLlIC4Ragw5FEADk4z34oky5JQ5DZOch4rYeA6i-HMRhoe0mDHNYd-b5CbAvaYSCdMw6-b9zvMj2EtJOtCR5wnftdUq8XS1aFGUoSPGuOXnGGjGfAvz9C4u9HO_zxR98hdF2TT_npV3CdbtnhAdloBC-rs2UPycz_tp2_pKP3Yp8OGykLLnCr6eXw48OazU0tdHkVZUQjuKRJcwMQaOjivLiwdXJpq2nAv6JGqT70JErFoqirUqZljH0iBO8P7s4Iis8Y1OVwVEH_Xs_oR-XIt8_GYbBdlYZ8QGpgAQnDjC8YSOIQqUAxTQmwEXWSadQhrMSKNq9uO8iFzCfs3BJb8C7A65M3mocW6bMnVzfcRfJumWHO8uVBW36QzYTLTJtC2BwMzMMae1eCfYJVz7QvLY551yGuErkTLCAM0yiV4wM_EGmOyj_l9PlbU65C9FrrSmcxa_sHt7tW3X5DbAGg5GU8PnpI7DPWYG07gHtleVuf2GbllLpazunreLEhKTq4b2L8BmD94ew
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=BPAP%3A+FPGA+Design+of+a+RISC-like+Processor+for+Elliptic+Curve+Cryptography+Using+Task-Level+Parallel+Programming+in+High-Level+Synthesis&rft.jtitle=Cryptography&rft.au=Rares+Ifrim&rft.au=Decebal+Popescu&rft.date=2025-03-01&rft.pub=MDPI+AG&rft.eissn=2410-387X&rft.volume=9&rft.issue=1&rft.spage=20&rft_id=info:doi/10.3390%2Fcryptography9010020&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_dbc4be15e6ca4a1eb8870763b07e383d
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2410-387X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2410-387X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2410-387X&client=summon