EGCrypto: a low-complexity elliptic galois cryptography model for secure data transmission in IoT

M Kaur, AA Alzubi, TS Walia, V Yadav, N Kumar… - IEEE …, 2023 - ieeexplore.ieee.org
In recent years, data security has been a challenging endeavor, especially when the data is
being transmitted every second. Internet of Things (IoT) involves continuously sending data …

GMC-crypto: Low latency implementation of ECC point multiplication for generic Montgomery curves over GF (p)

K Javeed, YA Shah, D Gregg - Journal of Parallel and Distributed …, 2024 - Elsevier
Abstract Elliptic Curve Cryptography (ECC) is the front-runner among available public key
cryptography (PKC) schemes due to its potential to offer higher security per key bit. All ECC …

ECSM: efficient FPGA implementation of elliptic curve scalar multiplication over generic prime field GF(p)

K Javeed, A El-Moursy, D Gregg - The Journal of Supercomputing, 2024 - Springer
Elliptic curve scalar multiplication (ECSM) is the primitive operation that is also the main
computational hurdle in almost all protocols based on elliptic curve cryptography (ECC) …

The Emerging Challenges of Wearable Biometric Cryptosystems

KA Ajlan, T Alsboui, O Alshaikh, I Inuwa-Dute, S Khan… - Cryptography, 2024 - mdpi.com
Cryptographic key generation and data encryption and decryption using wearable biometric
technologies is an emerging research area with significant potential for authentication and …

Area‐time efficient point multiplication architecture on twisted Edwards curve over general prime field

K Javeed, A El‐Moursy - International Journal of Circuit Theory …, 2023 - Wiley Online Library
Elliptic curve point multiplication is the main primitive required in almost all security schemes
using elliptic curve cryptography (ECC). It is the leading computationally intensive operation …

High-Performance ECC Scalar Multiplication Architecture Based on Comb Method and Low-Latency Window Recoding Algorithm

J Zhang, Z Chen, M Ma, R Jiang, H Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Elliptic curve scalar multiplication (ECSM) is the essential operation in elliptic curve
cryptography (ECC) for achieving high performance and security. We introduce a novel high …

DCryp-Unit: Crypto Hardware Accelerator Unit Design for Elliptic Curve Point Multiplication

AR Alharbi, MM Hazzazi, SS Jamal, A Aljaedi… - IEEE …, 2024 - ieeexplore.ieee.org
We propose a hardware-optimized design that implements a Montgomery Elliptic-curve
point multiplication Algorithm over using Lopez-Dahab projective coordinates. Moreover, we …

[HTML][HTML] AI-optimized elliptic curve with Certificate-Less Digital Signature for zero trust maritime security

M Al-Khalidi, R Al-Zaidi, T Ali, S Khan, AK Bashir - Ad Hoc Networks, 2025 - Elsevier
The proliferation of sensory applications has led to the development of the Internet of Things
(IoT), which extends connectivity beyond traditional computing platforms and connects all …

FPGA Implementation of Area-Time Aware ECC Scalar Multiplication Core

K Javeed - 2023 30th IEEE International Conference on …, 2023 - ieeexplore.ieee.org
Elliptic curve cryptography (ECC) is capable of providing higher security per key bit which
makes it a great choice for ensuring different security services in many resource-limited …

A Comparative Study of Elliptic curve and Hyperelliptic Curve Cryptography Methods and an Overview of Their Applications

A Yadav, P Sharma, Y Gigras - 2024 International Conference …, 2024 - ieeexplore.ieee.org
The significance of cybersecurity in today's highly technological era cannot be overstated.
With the advancement of modern technologies, various security measures have been …