Secure Evolutionary Hardware for Public-Key Cryptosystems

Created by W.Langdon from gp-bibliography.bib Revision:1.4420

  title =        "Secure Evolutionary Hardware for Public-Key
  author =       "Nadia Nedjah and Luiza Mourelle",
  pages =        "2130--2137",
  booktitle =    "Proceedings of the 2004 IEEE Congress on Evolutionary
  year =         "2004",
  publisher =    "IEEE Press",
  month =        "20-23 " # jun,
  address =      "Portland, Oregon",
  ISBN =         "0-7803-8515-2",
  keywords =     "genetic algorithms, genetic programming, Evolutionary
                 Computation in Cryptology and Computer Security,
                 Evolutionary design \& evolvable hardware, Evolutionary
                 Design Automation",
  DOI =          "doi:10.1109/CEC.2004.1331160",
  abstract =     "Genetic programming is used as an alternative
                 methodology to automatically generate secure and
                 minimal hardware designs of public-key cryptosystems
                 such as RSA encryption system. We evolve optimal
                 hardware circuits for modular exponentiation, which a
                 cornerstone operation in almost every cryptographic
                 system. The evolved circuits minimize both space (i.e.
                 required gate number) and time (i.e. encryption and
                 decryption time). The evolved designs are shielded
                 against side-channel leakage and hence secure. The
                 structure of the cryptographic circuit is random and so
                 the private key cannot be deduced using known attacks.
                 We compare our results against existing well-known
                 designs which were produced by human designers based on
                 the binary method.",
  notes =        "CEC 2004 - A joint meeting of the IEEE, the EPS, and
                 the IEE.",

Genetic Programming entries for Nadia Nedjah Luiza de Macedo Mourelle