2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03).
DOI: 10.1109/icassp.2003.1202444
|View full text |Cite
|
Sign up to set email alerts
|

High radix parallel architecture for GF(p) elliptic curve processor

Abstract: A new GF@) cryptographic processor architecture for elliptic curve encryptionidecryption is proposed in this paper. The architecture takes advantage of projective coordinates to convert GF(p) inversion needed in elliptic point operations into several multiplication steps. Unlike existing sequential designs, we show that projecting into (X/Z,Y/Z) leads to a much better improved perfomance than conventional choice of projecting into the current (X/Z2,Y/Z3). We also propose to use high radix modulo multipliers wh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 10 publications
(31 citation statements)
references
References 11 publications
0
30
0
Order By: Relevance
“…As mentioned earlier, the points operations over elliptic curve requires inversion [10]. This inversion is the most expensive operation [13,[18][19][20] within all ECC calculations.…”
Section: Left To Right Algorithmmentioning
confidence: 99%
See 4 more Smart Citations
“…As mentioned earlier, the points operations over elliptic curve requires inversion [10]. This inversion is the most expensive operation [13,[18][19][20] within all ECC calculations.…”
Section: Left To Right Algorithmmentioning
confidence: 99%
“…Assume the base point is (x,y) is noted as P. The ECC algorithm is to calculate nP from P, which is performed by the binary method, since it is known to be efficient and practical to implement in hardware [2,5,7,9,10]. The binary method for scalar multiplication over an elliptic curve can be easily adapted form the corresponding algorithms used in exponentiation, and are summarized below:…”
Section: Encryption and Decryptionmentioning
confidence: 99%
See 3 more Smart Citations