Proceedings of the 51st Annual Design Automation Conference 2014
DOI: 10.1145/2593069.2593148
|View full text |Cite
|
Sign up to set email alerts
|

Hardware/Software Co-Design of Elliptic-Curve Cryptography for Resource-Constrained Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…Elliptic curve cryptography is a public key cryptosystem [22] based on the algebraic structure of elliptic curves over finite a field that relies on the believed difficulty of the elliptic curve discrete logarithm for its security. It accepted as an alternative to cryptosystems such as RSA and ElGamal over finite fields.…”
Section: Elliptic Curve Cryptography (Ecc)mentioning
confidence: 99%
“…Elliptic curve cryptography is a public key cryptosystem [22] based on the algebraic structure of elliptic curves over finite a field that relies on the believed difficulty of the elliptic curve discrete logarithm for its security. It accepted as an alternative to cryptosystems such as RSA and ElGamal over finite fields.…”
Section: Elliptic Curve Cryptography (Ecc)mentioning
confidence: 99%
“…, use the clock cycles required to run a PRNG [36] to determine the value of , use the clock cycles required to run a MAC and a hash [20,35] to compute the and , and use the clock cycles [35,37] to calculate the . According to Man et al [38], a lightweight passive tag can run 3.55 mega clock cycles per second, so that we can calculate the time required for proofing in each scheme, as depicted in Figure 6.…”
Section: Comparison Of Computationmentioning
confidence: 99%
“…In [11], the authors aimed at flexibility and presented a hardware support that featured five prime field-based NIST ECC curves. Optimized hardware/software co-design approaches were evaluated and proposed by the authors in [12], which accelerate ECC calculations for resource constrained applications. Further ECC implementations were presented, for example, by the authors in [13]- [15].…”
Section: Related Workmentioning
confidence: 99%