2014
DOI: 10.1109/tcsi.2013.2283691
|View full text |Cite
|
Sign up to set email alerts
|

Efficient algorithm and architecture for elliptic curve cryptography for extremely constrained secure applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
49
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 59 publications
(50 citation statements)
references
References 38 publications
0
49
0
Order By: Relevance
“…However, it did not give detail information about scalar multiplication execution time or frequency, so there is no way to compare the SM operation time with the proposed design here. The design in [18] adopts registers and bit-level multiplier share method and consumes 11.571 k gates area. The complexity of the scalar multiplication between GF(p) and GF(2 m ) is different, as example, the modular addition needs carry addition and modulo p operation in GF(p) while modular addition needs just xor operation in GF(2 m ).…”
Section: Implementation and Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…However, it did not give detail information about scalar multiplication execution time or frequency, so there is no way to compare the SM operation time with the proposed design here. The design in [18] adopts registers and bit-level multiplier share method and consumes 11.571 k gates area. The complexity of the scalar multiplication between GF(p) and GF(2 m ) is different, as example, the modular addition needs carry addition and modulo p operation in GF(p) while modular addition needs just xor operation in GF(2 m ).…”
Section: Implementation and Resultsmentioning
confidence: 99%
“…The modular addition is fundamental operation in low area ECC architecture. Therefore is difficult to compare which are better among [17,18] and the proposed design here from area consumption and operation time. Table 6 shows the performance data of several existing FPGA implementations based on EC scalar multiplication.…”
Section: Implementation and Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The estimated total number of NAND gates equivalent (GE) is 12,102 from the synthesized results, and a maximum clock frequency is 800 MHz. However, we use a clock frequency of 1,130 KHz in order to compare with other works [15][16][17]. As can be seen, the proposed architecture uses a similar number of NAND gates compared to other works.…”
Section: Results and Comparisonmentioning
confidence: 99%
“…When compared to stateof-the-art implementations, their implemented design achieved higher speeds and better area-delay. Kimmo U. Järvinen et.al [16] suggested efficient algorithm and architecture for elliptic curve cryptography for extremely constrained secure applications. They proposed an efficient implementation of point multiplication on Koblitz curves targeting extremely-constrained, secure applications.…”
Section: Related Workmentioning
confidence: 99%