2008
DOI: 10.1109/tc.2007.70832
|View full text |Cite
|
Sign up to set email alerts
|

Effects of Instruction-Set Extensions on an Embedded Processor: A Case Study on Elliptic Curve Cryptography over GF(2/sup m/)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 26 publications
0
4
0
Order By: Relevance
“…This is 44% faster than Karatsuba's method, which was employed in [40]. The result is particularly interesting because it contrasts sharply with results presented in [41], which claims that Karatsuba's is the most appropriate method for embedded devices. Besides the cryptographic code, a node needs to store its private key and public parameters in order to run ID-NIKDS.…”
Section: B Performancementioning
confidence: 71%
“…This is 44% faster than Karatsuba's method, which was employed in [40]. The result is particularly interesting because it contrasts sharply with results presented in [41], which claims that Karatsuba's is the most appropriate method for embedded devices. Besides the cryptographic code, a node needs to store its private key and public parameters in order to run ID-NIKDS.…”
Section: B Performancementioning
confidence: 71%
“…This process distinguishes it from other cryptography techniques. The use of an elliptic curve over a Galois field (GF ()) enhances computational efficiency and reduces complexities related to rounding errors [33]. GF (Q)'s values must exceed 1.…”
Section: A Low Complexity Elliptic Galois Cryptographymentioning
confidence: 99%
“…The encrypted data is hidden using the Optimal Matrix based XOR (OM-XOR) technique [34]. The image blocks are optimized through the ZSADE optimization algorithm, which selects the block from the complete image to conceal the data [33]. The following steps are involved in completing the process.…”
Section: Optimal Matrix Based Xormentioning
confidence: 99%
“…Some of the biggest challenges in the field of wireless communication are to provide a high security for various application services, to reduce power consummation of various processes and low bandwidth usage for communication media [2]. So it is very important to find out suitable asymmetric key cryptosystem to offer the same.…”
Section: Introductionmentioning
confidence: 99%