2017
DOI: 10.48550/arxiv.1710.08336
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

A Survey on Hardware Implementations of Elliptic Curve Cryptosystems

Bahram Rashidi

Abstract: In the past two decades, Elliptic Curve Cryptography (ECC) have become increasingly advanced. ECC, with much smaller key sizes, offers equivalent security when compared to other asymmetric cryptosystems. In this survey, an comprehensive overview of hardware implementations of ECC is provided. We first discuss different elliptic curves, point multiplication algorithms and underling finite field operations over binary fields F2m and prime fields Fp which are used in the literature for hardware implementation. Th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 125 publications
(321 reference statements)
0
1
0
Order By: Relevance
“…One part of ECC consists of elliptic curves defined over a finite field of positive integers modulo a prime number p. Curve25519 is one of the fastest and mostly commonly used elliptic curves defined with p = 2 255 − 19 [Ber06]. Operations on points of the elliptic curve consist of field operations, the most time-consuming of which is modular inversion with modulus p. As a result, many ECC implementations use different coordinate systems for most of the computation to minimize the number of inversions required [Ras17].…”
Section: Modular Inversionmentioning
confidence: 99%
“…One part of ECC consists of elliptic curves defined over a finite field of positive integers modulo a prime number p. Curve25519 is one of the fastest and mostly commonly used elliptic curves defined with p = 2 255 − 19 [Ber06]. Operations on points of the elliptic curve consist of field operations, the most time-consuming of which is modular inversion with modulus p. As a result, many ECC implementations use different coordinate systems for most of the computation to minimize the number of inversions required [Ras17].…”
Section: Modular Inversionmentioning
confidence: 99%
“…It is also worth mentioning that ECC-based cryptography protocols can be developed using finite fields with binary characteristics GF (2 m ). An interested reader is referred to [42], [43], [44], and [45] for further information about such proposals. This work presents an efficient EC cryptographic processor over a general prime field.…”
Section: Introductionmentioning
confidence: 99%
“…Like the extensive use of ECCs as mentioned in the [9] survey research on ECC hardware implementation, constructing various arithmetic operations efficiently in ECC circuits has become increasingly crucial as hardware and quantum computing research have evolved. In this research, the ECC implementations are categorized into two main groups based on their implementation technologies: field programmable gate array (FPGA)-based implementations [10] and application-specific integrated circuit (ASIC)-based implementations [11].…”
Section: Introductionmentioning
confidence: 99%