2003
DOI: 10.1145/1024295.1024299
|View full text |Cite
|
Sign up to set email alerts
|

A workload characterization of elliptic curve cryptography methods in embedded environments

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2005
2005
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…We use benchmarks from several benchmark suites for embedded systems: MiBench [17], MediaBench [22], and Basicrypt [6]. Table 2 lists benchmarks, their descriptions, and the number of executed instructions, while Table 2 gives the number of I-cache misses per 1000 instructions.…”
Section: Experimental Methodologymentioning
confidence: 99%
“…We use benchmarks from several benchmark suites for embedded systems: MiBench [17], MediaBench [22], and Basicrypt [6]. Table 2 lists benchmarks, their descriptions, and the number of executed instructions, while Table 2 gives the number of I-cache misses per 1000 instructions.…”
Section: Experimental Methodologymentioning
confidence: 99%
“…The MQQ with a 160-bit key obtains the same security level of the RSA with a 1024-bit key and ECC with 192 bits. Using the data provided by Table 1, taken from Branovic et al (2004), it is possible to notice.…”
Section: Simulation Environmentmentioning
confidence: 99%
“…However, as many permutations exist, it is more practical to apply a benchmark instead of theoretical research. This will be done by measuring the process of the entire transaction, similar to how it has been done previously to standalone ECC [25,26]. Consequently, measurements of key generation, encryption, and decryption will follow.…”
Section: Introductionmentioning
confidence: 99%
“…Seeing the relevance of the work of Gura [25] and Branovic [26] it is reasonable to refresh their work by adding the newly found combinations to their results. Additionally, as the Internet of Things was not as popular then as it was now [3], the efficiency of ECC was not yet placed in the context of the IoT.…”
Section: Introductionmentioning
confidence: 99%