A survey on hardware implementations of elliptic curve cryptosystems

B Rashidi - arXiv preprint arXiv:1710.08336, 2017 - arxiv.org
In the past two decades, Elliptic Curve Cryptography (ECC) have become increasingly
advanced. ECC, with much smaller key sizes, offers equivalent security when compared to …

Elliptic curve lightweight cryptography: A survey

CA Lara-Nino, A Diaz-Perez… - IEEE Access, 2018 - ieeexplore.ieee.org
Since it was invented in 1986, elliptic curve cryptography (ECC) has been studied widely in
industry and academy from different perspectives. Some of these aspects include …

Efficient algorithm and architecture for elliptic curve cryptography for extremely constrained secure applications

R Azarderakhsh, KU Järvinen… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Recently, considerable research has been performed in cryptography and security to
optimize the area, power, timing, and energy needed for the point multiplication operations …

High performance hardware support for elliptic curve cryptography over general prime field

K Javeed, X Wang, M Scott - Microprocessors and Microsystems, 2017 - Elsevier
Secure information exchange in resource constrained devices can be accomplished
efficiently through elliptic curve cryptography (ECC). Due to the high computational …

Review of elliptic curve cryptography processor designs

H Marzouqi, M Al-Qutayri, K Salah - Microprocessors and Microsystems, 2015 - Elsevier
Abstract Elliptic Curve Cryptography (ECC) is a multilayer system with increased hardware
implementation complexity. A wide range of parameters and design choices affect the …

[PDF][PDF] Elliptic curve cryptography for constrained devices

SS Kumar - 2006 - informatik.rub.de
There is a re-emerging demand for low-end devices such as 8-bit processors, driven by
needs for pervasive applications like sensor networks and RF-ID tags. Security in pervasive …

A tightly coupled finite field arithmetic hardware in an FPGA-based embedded processor core for elliptic curve cryptography

M Khalil-Hani, A Irwansyah… - International Journal of …, 2009 - inderscienceonline.com
This work presents the implementation of a tightly-coupled hardware architectural
enhancement to the Altera FPGA-based Nios II embedded processor. The goal is to …

Field-programmable gate array (FPGA) hardware design and implementation ofa new area efficient elliptic curve crypto-processor

M Kashif, I Cicek - Turkish Journal of Electrical Engineering …, 2021 - journals.tubitak.gov.tr
Elliptic curve cryptography provides a widely recognized secure environment for information
exchange in resource-constrained embedded system applications, such as Internet-of …

Elliptic curve cryptography engineering

A Cilardo, L Coppolino, N Mazzocca… - Proceedings of the …, 2006 - ieeexplore.ieee.org
In recent years, elliptic curve cryptography (ECC) has gained widespread exposure and
acceptance, and has already been included in many security standards. Engineering of …

A new finite field multiplication algorithm to improve elliptic curve cryptosystem implementations

A Rezai, P Keshavarzi - 2013 - sid.ir
This paper presents a new and efficient implementation approach for the elliptic curve
cryptosystem (ECC) based on a novel FINITE FIELD MULTIPLICATION in GF (2m) and an …