2014
DOI: 10.3390/s141017883
|View full text |Cite
|
Sign up to set email alerts
|

Design of an Elliptic Curve Cryptography Processor for RFID Tag Chips

Abstract: Radio Frequency Identification (RFID) is an important technique for wireless sensor networks and the Internet of Things. Recently, considerable research has been performed in the combination of public key cryptography and RFID. In this paper, an efficient architecture of Elliptic Curve Cryptography (ECC) Processor for RFID tag chip is presented. We adopt a new inversion algorithm which requires fewer registers to store variables than the traditional schemes. A new method for coordinate swapping is proposed, wh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(24 citation statements)
references
References 24 publications
0
24
0
Order By: Relevance
“…Considering that the ECC-163 implementation in [12] required 13.8 K GE, our requirement should be less.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Considering that the ECC-163 implementation in [12] required 13.8 K GE, our requirement should be less.…”
Section: Discussionmentioning
confidence: 99%
“…At 13.56 MHz, this is about 22 ms. The more recent work in [12] designed an ECC-163 processor which took 176,700 clock cycles which at 13.56 MHz, takes about 13.1 ms. It required about 13.8 K GE and consumed 253 µW of power.…”
Section: Related Workmentioning
confidence: 99%
“…This has led researchers to consider ECC as a lightweight authentication scheme in many IoT applications [23][24][25]. Currently, it is the security backbone for many applications and systems, such as mobile devices and network protocols [26,27]. Mathematically, the ECC can be defined using the Weierstrass equation as:…”
Section: Elliptic Curve Cryptosystem (Ecc)mentioning
confidence: 99%
“…However, their design is slower and occupied more area than ours. In the same year, the authors in [13], proposed a design of an elliptic curve cryptography processor as an application for RFID tag chips. The works cited below are vulnerable to attacks.…”
Section: Related Workmentioning
confidence: 99%