sumit gupta - Academia.edu (original) (raw)

sumit gupta

Uploads

Papers by sumit gupta

Research paper thumbnail of Down-regulation of Cholesterol 7alpha Hydroxylase (CYP7A1) Gene Expression by Bile Acids in Primary Rat Hepatocytes Is Mediated by the c-Jun N-terminal Kinase Pathway

Journal of Biological Chemistry, 2001

Research paper thumbnail of Effect of annealing, size and cut-outs on axial collapse behaviour of circular tubes

International Journal of Mechanical Sciences, 1993

Research paper thumbnail of Axial compression of metallic spherical shells between rigid plates

Thin-walled Structures, 1999

Research paper thumbnail of Performance analysis of elliptic curve cryptography for SSL

Research paper thumbnail of An End-to-End Systems Approach to Elliptic Curve Cryptography

Since its proposal by Victor Miller [17] and Neal Koblitz [15] in the mid 1980s, Elliptic Curve C... more Since its proposal by Victor Miller [17] and Neal Koblitz [15] in the mid 1980s, Elliptic Curve Cryptography (ECC) has evolved into a mature public-key cryptosystem. Offering the smallest key size and the highest strength per bit, its computational efficiency can benefit both client devices and server machines. We have designed a programmable hardware accelerator to speed up point multiplication for elliptic curves over binary polynomial fields GF(2m). The accelerator is based on a scalable architecture capable of handling curves of arbitrary field degrees up to m = 255. In addition, it delivers optimized performance for a set of commonly used curves through hard-wired reduction logic. A prototype implementation running in a Xilinx XCV2000E FPGA at 66.4 MHz shows a performance of 6987 point multiplications per second for GF(2163). We have integrated ECC into OpenSSL, today's dominant implementation of the secure Internet protocol SSL, and tested it with the Apache web server and open-source web browsers.

Research paper thumbnail of KSSL: Experiments in Wireless Internet Security

Internet enabled wireless devices continue to proliferate and are expected to surpass traditional... more Internet enabled wireless devices continue to proliferate and are expected to surpass traditional Internet clients in the near future. This has opened up exciting new opportunities in the mobile e-commerce mar-ket. However, data security and privacy remain major concerns in the ...

Research paper thumbnail of Experiments in wireless Internet security

Internet enabled wireless devices continue to proliferate and are expected to surpass traditional... more Internet enabled wireless devices continue to proliferate and are expected to surpass traditional Internet clients in the near future. This has opened up exciting new opportunities in the mobile e-commerce market. However, data security and privacy remain major concerns in the current generation of "wireless Web" offerings. All such offerings today use a security architecture that lacks end-to-end security. This unfortunate choice is driven by perceived inadequacies of standard Internet security protocols like SSL (secure sockets layer) on less capable CPUs and low-bandwidth wireless links. This paper presents our experiences in implementing and using standard security mechanisms and protocols on small wireless devices. Our results show that SSL is a practical solution for ensuring end-to-end security of wireless Internet transactions even within todays technological constraints.

Research paper thumbnail of Securing the wireless internet

IEEE Communications Magazine, 2001

Research paper thumbnail of Down-regulation of Cholesterol 7alpha Hydroxylase (CYP7A1) Gene Expression by Bile Acids in Primary Rat Hepatocytes Is Mediated by the c-Jun N-terminal Kinase Pathway

Journal of Biological Chemistry, 2001

Research paper thumbnail of Effect of annealing, size and cut-outs on axial collapse behaviour of circular tubes

International Journal of Mechanical Sciences, 1993

Research paper thumbnail of Axial compression of metallic spherical shells between rigid plates

Thin-walled Structures, 1999

Research paper thumbnail of Performance analysis of elliptic curve cryptography for SSL

Research paper thumbnail of An End-to-End Systems Approach to Elliptic Curve Cryptography

Since its proposal by Victor Miller [17] and Neal Koblitz [15] in the mid 1980s, Elliptic Curve C... more Since its proposal by Victor Miller [17] and Neal Koblitz [15] in the mid 1980s, Elliptic Curve Cryptography (ECC) has evolved into a mature public-key cryptosystem. Offering the smallest key size and the highest strength per bit, its computational efficiency can benefit both client devices and server machines. We have designed a programmable hardware accelerator to speed up point multiplication for elliptic curves over binary polynomial fields GF(2m). The accelerator is based on a scalable architecture capable of handling curves of arbitrary field degrees up to m = 255. In addition, it delivers optimized performance for a set of commonly used curves through hard-wired reduction logic. A prototype implementation running in a Xilinx XCV2000E FPGA at 66.4 MHz shows a performance of 6987 point multiplications per second for GF(2163). We have integrated ECC into OpenSSL, today's dominant implementation of the secure Internet protocol SSL, and tested it with the Apache web server and open-source web browsers.

Research paper thumbnail of KSSL: Experiments in Wireless Internet Security

Internet enabled wireless devices continue to proliferate and are expected to surpass traditional... more Internet enabled wireless devices continue to proliferate and are expected to surpass traditional Internet clients in the near future. This has opened up exciting new opportunities in the mobile e-commerce mar-ket. However, data security and privacy remain major concerns in the ...

Research paper thumbnail of Experiments in wireless Internet security

Internet enabled wireless devices continue to proliferate and are expected to surpass traditional... more Internet enabled wireless devices continue to proliferate and are expected to surpass traditional Internet clients in the near future. This has opened up exciting new opportunities in the mobile e-commerce market. However, data security and privacy remain major concerns in the current generation of "wireless Web" offerings. All such offerings today use a security architecture that lacks end-to-end security. This unfortunate choice is driven by perceived inadequacies of standard Internet security protocols like SSL (secure sockets layer) on less capable CPUs and low-bandwidth wireless links. This paper presents our experiences in implementing and using standard security mechanisms and protocols on small wireless devices. Our results show that SSL is a practical solution for ensuring end-to-end security of wireless Internet transactions even within todays technological constraints.

Research paper thumbnail of Securing the wireless internet

IEEE Communications Magazine, 2001

Log In