the highest security per bit of any known public key cryptosystem. This benefit of smaller key
sizes makes ECC particularly attractive for constrained devices, since its implementation
requires less memory and processing power. The present work gives a description of a
hardware implementation of an F 2 m elliptic curve cryptographic processor using field
programmable gate array circuit technology. We provide simulation and implementation …