2009
DOI: 10.1007/s11265-009-0376-x
|View full text |Cite
|
Sign up to set email alerts
|

Efficient FPGA Implementation of a Programmable Architecture for GF(p) Elliptic Curve Crypto Computations

Abstract: This paper presents a processor architecture for elliptic curve cryptography computations over GF(p). The speed to compute the Elliptic-curve point multiplication over the prime fields GF(p) is increased by using the maximum degree of parallelism, and by carefully selecting the most appropriate coordinates system. The proposed Elliptic Curve processor is implemented using FPGAs. The time, area and throughput results are obtained, analyzed, and compared with previously proposed designs showing interesting perfo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(8 citation statements)
references
References 16 publications
0
8
0
Order By: Relevance
“…The change of the parameters 'a' and 'b' gives different elliptic curves (Certicom Corp., 2000a;2000b;Tawalbeh et al, 2010;Srivastava and Mathur, 2013). One of the crucial decisions when implementing an efficient ECC over GF(p) is deciding which point coordinates system to use.…”
Section: Elliptic Curve Cryptography Eccmentioning
confidence: 99%
See 3 more Smart Citations
“…The change of the parameters 'a' and 'b' gives different elliptic curves (Certicom Corp., 2000a;2000b;Tawalbeh et al, 2010;Srivastava and Mathur, 2013). One of the crucial decisions when implementing an efficient ECC over GF(p) is deciding which point coordinates system to use.…”
Section: Elliptic Curve Cryptography Eccmentioning
confidence: 99%
“…One of the crucial decisions when implementing an efficient ECC over GF(p) is deciding which point coordinates system to use. In (Tawalbeh et al, 2010), details of three different projective coordinate systems are given. The first one is the affine coordinate where a point is represented as (X A ,Y A ).…”
Section: Elliptic Curve Cryptography Eccmentioning
confidence: 99%
See 2 more Smart Citations
“…Other radix-2 MMM implementations are reported in [2], [3], [4], [5], [6], [7], [8], [9]. Amanor et al [11] have compared FPGA implementation of radix-2 MMM-based and IMM-based modular multipliers and found that the latter yields a better area-time product.…”
Section: Introductionmentioning
confidence: 99%