EC-crypto: Highly efficient area-delay optimized elliptic curve cryptography processor

K Javeed, A El-Moursy, D Gregg - IEEE Access, 2023 - ieeexplore.ieee.org
Elliptic Curve Cryptography (ECC) based security protocols require much shorter key space
which makes ECC the most suitable option for resource-limited devices as compared to the …

Area‐time efficient point multiplication architecture on twisted Edwards curve over general prime field

K Javeed, A El‐Moursy - International Journal of Circuit Theory …, 2023 - Wiley Online Library
Elliptic curve point multiplication is the main primitive required in almost all security schemes
using elliptic curve cryptography (ECC). It is the leading computationally intensive operation …

DCryp-Unit: Crypto Hardware Accelerator Unit Design for Elliptic Curve Point Multiplication

AR Alharbi, MM Hazzazi, SS Jamal, A Aljaedi… - IEEE …, 2024 - ieeexplore.ieee.org
We propose a hardware-optimized design that implements a Montgomery Elliptic-curve
point multiplication Algorithm over using Lopez-Dahab projective coordinates. Moreover, we …

Lightweight authentication scheme based on Elliptic Curve El Gamal

S Baccouri, H Farhat, T Azzabi… - Journal of Information and …, 2024 - Taylor & Francis
ABSTRACT Elliptic Curve Cryptography (ECC) is a promising cryptosystem as it presents
the ideal choice for implementing public-key cryptography in resource-limited devices, such …

FPGA Implementation of Area-Time Aware ECC Scalar Multiplication Core

K Javeed - 2023 30th IEEE International Conference on …, 2023 - ieeexplore.ieee.org
Elliptic curve cryptography (ECC) is capable of providing higher security per key bit which
makes it a great choice for ensuring different security services in many resource-limited …

ASAP-IIOT: An Anonymous Secure Authentication Protocol for Industrial Internet of Things

N Li, M Ma, H Wang - Sensors, 2024 - mdpi.com
With the increasing demand for a digital world, the Industrial Internet of Things (IIoT) is
growing rapidly across various industries. In manufacturing, particularly in Industry 4.0, the …

A Digital Signature Architecture Suitable for V2V Applications

H Mosanaei-Boorani… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The elliptic curve digital signature algorithm (ECDSA) is widely used for guaranteeing data
integrity and user authentication in internet of things (IoT) applications such as intelligent …

GMC-Crypto: Low Latency Implementation of ECC Point Multiplication for Generic Montgomery Curves over GF (p)

K Javeed, YA Shah, D Gregg - Journal of Parallel and Distributed …, 2024 - Elsevier
Abstract Elliptic Curve Cryptography (ECC) is the front-runner among available public key
cryptography (PKC) schemes due to its potential to offer higher security per key bit. All ECC …

Lightweight authentication for IoT devices based on elliptic curve el gamal using ephemeral encoding parameters

S Baccouri, H Farhat, T Azzabi… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
Wireless Sensor Networks (WSN) present a subset of the IOT with a huge increase in usage
in various fields such as industry, agriculture, medicine, and military. Unfortunately, most …

A High Speed and Area Efficient Processor for Elliptic Curve Scalar Point Multiplication for GF()

M Thirumoorthi, AJ Leigh, M Heidarpur… - … Transactions on Very …, 2024 - ieeexplore.ieee.org
Binary polynomial multipliers impact the overall performance and cost of elliptic curve
cryptography (ECC) systems. Multiplication algorithms with subquadratic computational …