Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06) 2006
DOI: 10.1109/percomw.2006.110
|View full text |Cite
|
Sign up to set email alerts
|

Power aware design of an elliptic curve coprocessor for 8 bit platforms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
20
0

Year Published

2007
2007
2018
2018

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(20 citation statements)
references
References 10 publications
0
20
0
Order By: Relevance
“…From the below table that summarizes the set of hardware implementations of ECC in WSN already detailed in the previous sub-section, binary fields is used in the majority of implementations [36]- [39], [41], [42] and few over primary field F p [28], [40] [42] is the fastest with 84µs for point multiplication and relatively less consuming energy with 55µW comparing it with other primitives. Implementation in [38] performed ECC operation with area, time and consumption trade-off that are respectively 8104 gates, 115ms and 30µW.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…From the below table that summarizes the set of hardware implementations of ECC in WSN already detailed in the previous sub-section, binary fields is used in the majority of implementations [36]- [39], [41], [42] and few over primary field F p [28], [40] [42] is the fastest with 84µs for point multiplication and relatively less consuming energy with 55µW comparing it with other primitives. Implementation in [38] performed ECC operation with area, time and consumption trade-off that are respectively 8104 gates, 115ms and 30µW.…”
Section: Discussionmentioning
confidence: 99%
“…Implementation in [38] performed ECC operation with area, time and consumption trade-off that are respectively 8104 gates, 115ms and 30µW. For WSN security, although most of the reviewed implementations were implemented on Application Specific Integrated Circuits (ASIC) [28], [36]- [39], [42], ECC can be implemented in FPGA [40], [41]. The lack of these works is the fact that most of them not implement the full scheme of key exchange and authentication with respectively ECDH and ECDSA which allows to strengthen the security of WSN and to resolve some constraints found in software implementation such as power, performance and area.…”
Section: Discussionmentioning
confidence: 99%
“…Recently, several works like [4], [5], [6], [7] have addressed or successfully have implemented public key schemes with current generation sensors. Both from software and hardware perspectives, PKC schemes have shown reasonable performances.…”
Section: Literature Reviewmentioning
confidence: 99%
“…A more recent work on hardware implementation of PKC is proposed for elliptic curve over binary extension fields in [7]. The authors have proposed a dedicated coprocessor for certain cryptographic operations.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation