2023
DOI: 10.3390/mi14051037
|View full text |Cite
|
Sign up to set email alerts
|

FPGA Implementation for Elliptic Curve Cryptography Algorithm and Circuit with High Efficiency and Low Delay for IoT Applications

Abstract: The Internet of Things requires greater attention to the security and privacy of the network. Compared to other public-key cryptosystems, elliptic curve cryptography can provide better security and lower latency with shorter keys, rendering it more suitable for IoT security. This paper presents a high-efficiency and low-delay elliptic curve cryptographic architecture based on the NIST-p256 prime field for IoT security applications. A modular square unit utilizes a fast partial Montgomery reduction algorithm, d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(11 citation statements)
references
References 23 publications
(27 reference statements)
0
0
0
Order By: Relevance
“…The designs described in [6], [11]- [13] are centered around the Weierstrass ECC model operating within a GF (2 m ) field. The design of [14] describes a hardware accelerator for FPGA devices, where a Weierstrass ECC model over a GF (P ) field, with P = 256, has been implemented. The BHC curve is considered for hardware acceleration in designs of [15], [16].…”
Section: A Existing Hardware Designs and Limitationsmentioning
confidence: 99%
See 3 more Smart Citations
“…The designs described in [6], [11]- [13] are centered around the Weierstrass ECC model operating within a GF (2 m ) field. The design of [14] describes a hardware accelerator for FPGA devices, where a Weierstrass ECC model over a GF (P ) field, with P = 256, has been implemented. The BHC curve is considered for hardware acceleration in designs of [15], [16].…”
Section: A Existing Hardware Designs and Limitationsmentioning
confidence: 99%
“…Instead of hardware accelerators of [6], [11]- [13], [15] over binary field lengths, prime field over GF (P ) with P = 256 is considered in [14], [17], [19] for hardware acceleration. One accelerator over special ECC Curve448 is described in [21].…”
Section: B Comparisonsmentioning
confidence: 99%
See 2 more Smart Citations
“…The Weierstrass, binary Huff curves (BHCs), Hessian, and binary Edward curves (BECs) are various ECC models. Therefore, the most related state-of-the-art hardware accelerators are described in [6,[10][11][12][13][14][15][16][17][18][19]. Reference [6] proposes a pipelined architecture to accelerate ECPM operation by reducing the critical path delay.…”
Section: Related Ecpm Hardware Accelerators and Limitationsmentioning
confidence: 99%