Studying software implementations of elliptic curve cryptography

H Yan, ZJ Shi - Third International Conference on Information …, 2006 - ieeexplore.ieee.org
Elliptic Curve Cryptography (ECC) provides a similar level of security to conventional integer-
based public-key algorithms, but with much shorter keys. ECC over binary field is of special …

[PDF][PDF] Software Implementations of Elliptic Curve Cryptography.

ZJ Shi, H Yun - Int. J. Netw. Secur., 2008 - Citeseer
Abstract Elliptic Curve Cryptography (ECC) is a promising alternative for public-key
algorithms in resource-constrained systems because it provides a similar level of security …

Performance of finite field arithmetic in an elliptic curve cryptosystem

Z Li, J Higgins, M Clement - MASCOTS 2001, Proceedings …, 2001 - ieeexplore.ieee.org
The computational cost of encryption is a barrier to wider application of a variety of data
security protocols. Virtually all research on elliptic curve cryptography (ECC) provides …

A comparative and overview analysis of elliptic curve cryptography over finite fields

M Prabu, R Shanmugalakshmi - 2009 International Conference …, 2009 - ieeexplore.ieee.org
Recently, Finite Fields are the most important security mathematical function in the area of
elliptic curve cryptography. In this paper, we classify the finite fields into a prime field and a …

ECC hardware coprocessors for 8-bit systems and power consumption considerations

G Bertoni, L Breveglieri… - … Conference on Information …, 2006 - ieeexplore.ieee.org
In the group of public key algorithms, elliptic curve cryptosystems (or ECC) are widely
considered as the best compromise in terms of speed, memory requirement and security …

Efficient multiplication in GF (p/sup k/) for elliptic curve cryptography

JC Bajard, L Imbert, C Negre… - Proceedings 2003 16th …, 2003 - ieeexplore.ieee.org
We present a new multiplication algorithm for the implementation of elliptic curve
cryptography (ECC) over the finite extension fields GF (p/sup k/) where p is a prime number …

A compact fast variable key size elliptic curve cryptosystem coprocessor

L Gao, H Lee, GE Sobelman - Seventh Annual IEEE …, 1999 - ieeexplore.ieee.org
Elliptic curve (EC) cryptosystems have become more attractive due to their small key sizes
and varieties of choices of the curves available. However, it is not efficient to implement them …

FPGA implementation of a microcoded elliptic curve cryptographic processor

KH Leung, KW Ma, WK Wong… - Proceedings 2000 IEEE …, 2000 - ieeexplore.ieee.org
Elliptic curve cryptography (ECC) has been the focus of much recent attention since it offers
the highest security per bit of any known public key cryptosystem. This benefit of smaller key …

Research on elliptic curve cryptography

Q Qiu, Q Xiong - … on Computer Supported Cooperative Work in …, 2004 - ieeexplore.ieee.org
There are many drawbacks in current encryption algorithms in respect of security, real-time
performance and so on, and researchers are presenting various algorithms. Among them …

Implementation of ECC/ECDSA cryptography algorithms based on Java card

JH Han, YJ Kim, SI Jun, KI Chung… - Proceedings 22nd …, 2002 - ieeexplore.ieee.org
This paper describes the implementations and test results of elliptic curve cryptography
(ECC) and elliptic curve digital signature algorithm (ECDSA) algorithms based on Java card …