2018
DOI: 10.1109/access.2018.2881444
|View full text |Cite
|
Sign up to set email alerts
|

Elliptic Curve Lightweight Cryptography: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
44
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 96 publications
(56 citation statements)
references
References 82 publications
0
44
0
Order By: Relevance
“…Nowadays, there are two main public-key cipher suites for Transport Layer Security (TLS) [46], [47]: Rivest-Shamir-Adleman (RSA) based cipher suites [48] that also make use of RSA as the key exchange algorithm [49], [50]; and Elliptic Curve Diffie-Hellman Exchange (ECDHE), which is based on Elliptic Curve Cryptography (ECC) and performs exchanges through Ephemeral Diffie-Hellman [51]. Previous papers have already demonstrated that, in general, ECC is faster [52]- [55] and more energy efficient [56]- [62] than RSA. Nonetheless, in 2015 the National Security Agency (NSA) discouraged the use of Suite B, a set of cryptographic algorithms that made use of RSA and ECC.…”
Section: Privacymentioning
confidence: 99%
“…Nowadays, there are two main public-key cipher suites for Transport Layer Security (TLS) [46], [47]: Rivest-Shamir-Adleman (RSA) based cipher suites [48] that also make use of RSA as the key exchange algorithm [49], [50]; and Elliptic Curve Diffie-Hellman Exchange (ECDHE), which is based on Elliptic Curve Cryptography (ECC) and performs exchanges through Ephemeral Diffie-Hellman [51]. Previous papers have already demonstrated that, in general, ECC is faster [52]- [55] and more energy efficient [56]- [62] than RSA. Nonetheless, in 2015 the National Security Agency (NSA) discouraged the use of Suite B, a set of cryptographic algorithms that made use of RSA and ECC.…”
Section: Privacymentioning
confidence: 99%
“…ECC implemented in a small chip can provide high-speed data encryption and decryption facilities. In addition, it prevents unauthorized devices from gaining access to wireless sensor networks (WSNs) by providing a key agreement protocol for the wireless sensor nodes connected to the IoT infrastructures in the networks [ 5 , 6 , 7 , 8 ]. An elliptic curve cryptosystem would be one of the best candidates to meet the privacy and security challenges emerged in radio-frequency identification (RFID) technologies [ 9 , 10 , 11 ].…”
Section: Introductionmentioning
confidence: 99%
“…This paper presents an efficient interleaved modular multiplication algorithm along with its hardware design and implementations over GF(p) for lightweight, reconfigurable ECC processors [16], where primes p are National Institute of Standard and Technology (NIST)-recommended [17], [18]. The values of p are shown in Table 1.…”
Section: Introductionmentioning
confidence: 99%