Efficient Hardware Implementation of Elliptic Curve Cryptography over GF(p m )

MK Lee, KT Kim, H Kim, DK Kim - … , WISA 2005, Jeju Island, Korea, August …, 2006 - Springer
Elliptic curve cryptography (ECC) was discovered by Koblitz and Miller, and there has been
a vast amount of research on its secure and efficient implementation. To implement ECC …

A tightly coupled finite field arithmetic hardware in an FPGA-based embedded processor core for elliptic curve cryptography

M Khalil-Hani, A Irwansyah… - International Journal of …, 2009 - inderscienceonline.com
This work presents the implementation of a tightly-coupled hardware architectural
enhancement to the Altera FPGA-based Nios II embedded processor. The goal is to …

[PDF][PDF] Software Implementations of Elliptic Curve Cryptography.

ZJ Shi, H Yun - Int. J. Netw. Secur., 2008 - Citeseer
Abstract Elliptic Curve Cryptography (ECC) is a promising alternative for public-key
algorithms in resource-constrained systems because it provides a similar level of security …

A Simple Architectural Enhancement for Fast and Flexible Elliptic Curve Cryptography over Binary Finite Fields GF(2 m )

S Tillich, J Großschädl - Advances in Computer Systems Architecture: 9th …, 2004 - Springer
Mobile and wireless devices like cell phones and network-enhanced PDAs have become
increasingly popular in recent years. The security of data transmitted via these devices is a …

Efficient multiplication in GF (p/sup k/) for elliptic curve cryptography

JC Bajard, L Imbert, C Negre… - Proceedings 2003 16th …, 2003 - ieeexplore.ieee.org
We present a new multiplication algorithm for the implementation of elliptic curve
cryptography (ECC) over the finite extension fields GF (p/sup k/) where p is a prime number …

High performance hardware support for elliptic curve cryptography over general prime field

K Javeed, X Wang, M Scott - Microprocessors and Microsystems, 2017 - Elsevier
Secure information exchange in resource constrained devices can be accomplished
efficiently through elliptic curve cryptography (ECC). Due to the high computational …

Hardware implementation of elliptic curve cryptography over binary field

SV Sandeep, H Shanavas… - … Journal of Computer …, 2012 - search.proquest.com
This paper presents high-performance Elliptic Curve Cryptography (ECC) architecture over
binary field, based on the Montgomery scalar multiplication algorithm. The word-serial finite …

A Small and Fast Software Implementation of Elliptic Curve Cryptosystems over GF(p) on a 16-Bit Microcomputer

T Hasegawa, J Nakajima, M Matsui - IEICE transactions on …, 1999 - search.ieice.org
Recently the study and implementation of elliptic curve cryptosystems (ECC) have
developed rapidly and its achievements have become a center of attraction. ECC has the …

A High-Speed Elliptic Curve Cryptographic Processor for Generic Curves over

Y Ma, Z Liu, W Pan, J Jing - International Conference on Selected Areas in …, 2013 - Springer
Elliptic curve cryptography (ECC) is preferred for high-speed applications due to the lower
computational complexity compared with other public-key cryptographic schemes. As the …

Customising hardware designs for elliptic curve cryptography

N Telle, W Luk, RCC Cheung - … Modeling, and Simulation: Third and Fourth …, 2004 - Springer
This paper presents a method for producing hardware designs for Elliptic Curve
Cryptography (ECC) systems over the finite field GF (2 m), using the optimal normal basis for …