GMC-crypto: Low latency implementation of ECC point multiplication for generic Montgomery curves over GF (p)

K Javeed, YA Shah, D Gregg - Journal of Parallel and Distributed …, 2024 - Elsevier
Abstract Elliptic Curve Cryptography (ECC) is the front-runner among available public key
cryptography (PKC) schemes due to its potential to offer higher security per key bit. All ECC …

Area‐time efficient point multiplication architecture on twisted Edwards curve over general prime field

K Javeed, A El‐Moursy - International Journal of Circuit Theory …, 2023 - Wiley Online Library
Elliptic curve point multiplication is the main primitive required in almost all security schemes
using elliptic curve cryptography (ECC). It is the leading computationally intensive operation …

High-Performance ECC Scalar Multiplication Architecture Based on Comb Method and Low-Latency Window Recoding Algorithm

J Zhang, Z Chen, M Ma, R Jiang, H Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Elliptic curve scalar multiplication (ECSM) is the essential operation in elliptic curve
cryptography (ECC) for achieving high performance and security. We introduce a novel high …

Fast and efficient hardware architecture of Chebyshev polynomials algorithm for resisting to side channel attacks

B Madani, S Sadoudi, R Kaibou - The Journal of Supercomputing, 2025 - Springer
The field of embedded network security has seen increasing interest in developing
lightweight and efficient chaotic map-based key exchange protocols. Due to their semi …

FPGA Implementation of Area-Time Aware ECC Scalar Multiplication Core

K Javeed - 2023 30th IEEE International Conference on …, 2023 - ieeexplore.ieee.org
Elliptic curve cryptography (ECC) is capable of providing higher security per key bit which
makes it a great choice for ensuring different security services in many resource-limited …

Efficient ECC Processor Designs for IoT Using Edwards Curves and Exploiting FPGA Embedded Components

O Al-Khaleel, S Baktir, M Al-Khaleel, A Küpçü - IEEE Access, 2024 - ieeexplore.ieee.org
Elliptic Curve Cryptography (ECC) provides high security with shorter key sizes and higher
performance. Internet of Things (IoT) is the interconnected network where a vast number of …

A Compact and Low Latency SPM Architecture for ECC Cryptosystems

K Javeed, F Sibai, A El-Moursy - IEEE Access, 2024 - ieeexplore.ieee.org
Elliptic curve cryptography (ECC) is largely deployed public key cryptographic algorithms in
the design of key exchange, digital signature, and secure multiparty computation protocols …

A fast and efficient 191-bit Elliptic Curve Cryptographic Processor using a Hybrid Karatsuba Multiplier for IoT Applications

SS Dhanda, B Singh, CC Lin, P Jindal, D Panwar… - IEEE …, 2024 - ieeexplore.ieee.org
The most widely used asymmetric cipher is ECC. It can be applied to IoT applications to offer
various security services. However, a wide range of sectors have been investigated for …

New Adaptive Template Attacks Against Montgomery-Ladder-Based ECCs in IoT Devices

CH You, CH Chiang, PCP Chao… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
This study proposes a new adaptive template attack scheme for extracting secret keys in
Montgomery-ladder (ML)-based elliptic curve cryptography (ECC) by effectively exploiting …

[HTML][HTML] Area-Time-Efficient Secure Comb Scalar Multiplication Architecture Based on Recoding

Z Zhang, W Wang, J Zhang, X He, M Ma, S Ren… - Micromachines, 2024 - mdpi.com
With the development of mobile communication, digital signatures with low latency, low
area, and high security are in increasing demand. Elliptic curve cryptography (ECC) is …