2020
DOI: 10.1109/tcsii.2020.3012448
|View full text |Cite
|
Sign up to set email alerts
|

An Energy-Efficient Dual-Field Elliptic Curve Cryptography Processor for Internet of Things Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 28 publications
(23 citation statements)
references
References 15 publications
0
12
0
Order By: Relevance
“…The area of this design is the smallest in Table 3 designs. In terms of the area‐time (AT), this design is also at least 600% and 68% superior to lightweight designs [1, 4, 5] and high‐speed designs [6, 7], respectively. In terms of power consumption, although our power consumption is higher than other designs, due to the shorter computation time of our design, the energy is lower than other designs [1, 4, 5].…”
Section: A Speed‐area‐efficient Hardware Ecpm‐enginementioning
confidence: 99%
“…The area of this design is the smallest in Table 3 designs. In terms of the area‐time (AT), this design is also at least 600% and 68% superior to lightweight designs [1, 4, 5] and high‐speed designs [6, 7], respectively. In terms of power consumption, although our power consumption is higher than other designs, due to the shorter computation time of our design, the energy is lower than other designs [1, 4, 5].…”
Section: A Speed‐area‐efficient Hardware Ecpm‐enginementioning
confidence: 99%
“…Its widely adoption is due to its ability to provide a similar security level with relatively smaller key-sizes as compared to the current public-key security standard (i.e., the Rivest-Shammir-Adleman (RSA) algorithm) [2]. From structural point of view, ECC involves four layers of operations [3]. The top most layer (fourth layer) ensures the encryption and decryption of data.…”
Section: Introductionmentioning
confidence: 99%
“…In addition to the layer model of ECC, there are two coordinate systems, i.e., affine, and projective. In past, the latter has more frequently been employed to optimize throughput [3]. Furthermore, two field representations, i.e., prime (GF(P)) and binary (GF(2 m )), are commonly involved.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations