2008
DOI: 10.1109/tvlsi.2008.2000728
|View full text |Cite
|
Sign up to set email alerts
|

On Parallelization of High-Speed Processors for Elliptic Curve Cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
38
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 77 publications
(38 citation statements)
references
References 42 publications
(84 reference statements)
0
38
0
Order By: Relevance
“…1(a) [8], where the latency of each step is indicated on the left, where the latency for GNB field addition, squaring and multiplication are 1, 1 and M clock cycles [16], respectively. [8]. (b) the proposed scheme using only three multipliers.…”
Section: Proposed Schemementioning
confidence: 99%
See 1 more Smart Citation
“…1(a) [8], where the latency of each step is indicated on the left, where the latency for GNB field addition, squaring and multiplication are 1, 1 and M clock cycles [16], respectively. [8]. (b) the proposed scheme using only three multipliers.…”
Section: Proposed Schemementioning
confidence: 99%
“…Binary curves have attracted many researchers to reduce point multiplication. These methods include parallelization, by using multiple parallel field multipliers in the finite field computations [8,9,10,11], and by interleaving [12,13]. Recently, several methods to perform parallel computations for point addition on Koblitz curves have been proposed in [8,9,11,13,14,15].…”
Section: Introductionmentioning
confidence: 99%
“…where a 1 ,a 3 ,a 2 ,a 4 ,a 5 Є E A set of pairs(x,y) which solves (1) and the point at infinity denoted by 'O' called as additive identity for the abelian group which are described in appendix are used to implement elliptic curve cryptography [5]. The elliptic curve can be analyzed over polynomial basis (10),dual basis(2), triangular basis(6) and redundant basis(3).…”
Section: Ecc Over Prime Fieldmentioning
confidence: 99%
“…The above proposed methodology minimizes number of loop carried dependence, data dependence, control dependence and register dependence which helps to improve code scheduling on software to minimize the different hazards and stalls during execution. But the linear scalar multiplication Equation 7, P is repeated k times alternatively to perform the different case of point doubling operation [5]. During the processing, the recent iteration is always dependent on early iteration known as loop carried dependence [11].…”
Section: Proposed Techniquementioning
confidence: 99%
“…The elliptic curve point multiplication is computed with point operations which, further are computed using finite field arithmetic. Although the point multiplication itself is hard to parallelize, it is possible to efficiently use parallelism [5], [6], [7], [8] in field arithmetic specifically to some of the NIST recommended elliptic curves.…”
Section: Introductionmentioning
confidence: 99%