2022
DOI: 10.3390/app12084091
|View full text |Cite
|
Sign up to set email alerts
|

Throughput/Area Optimized Architecture for Elliptic-Curve Diffie-Hellman Protocol

Abstract: This paper presents a high-speed and low-area accelerator architecture for shared key generation using an elliptic-curve Diffie-Hellman protocol over GF(2233). Concerning the high speed, the proposed architecture employs a two-stage pipelining and a Karatsuba finite field multiplier. The use of pipelining shortens the critical path which ultimately improves the clock frequency. Similarly, the employment of a Karatsuba multiplier decreases the required number of clock cycles. Moreover, an efficient rescheduling… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 33 publications
0
9
0
Order By: Relevance
“…If Node1 wants to communicate with Node2 then the ECDH steps include: (i) Node1 and Node2 use the same ECC configurations to prompt the required setup, (ii) computation of PM at each node (Node1 and Node2) for public key generation, (iii) exchange of generated public keys between two nodes (Node1 and Node2 in this demonstration example), and (iv) computation of PM on Node1 and Node2 for shared key generation. For mathematical structures and additional descriptions of ECDH protocol, we refer readers/designers to follow [6,14].…”
Section: Key-authentication Protocol (Ecdh)mentioning
confidence: 99%
See 3 more Smart Citations
“…If Node1 wants to communicate with Node2 then the ECDH steps include: (i) Node1 and Node2 use the same ECC configurations to prompt the required setup, (ii) computation of PM at each node (Node1 and Node2) for public key generation, (iii) exchange of generated public keys between two nodes (Node1 and Node2 in this demonstration example), and (iv) computation of PM on Node1 and Node2 for shared key generation. For mathematical structures and additional descriptions of ECDH protocol, we refer readers/designers to follow [6,14].…”
Section: Key-authentication Protocol (Ecdh)mentioning
confidence: 99%
“…Several PM algorithms are available in the literature. According to [14,15,28,30,31], the Double and Add algorithm is more convenient for unified models of ECC, e.g., Edwards, Huff, Twisted Edwards, etc. The Lopez Dahab PM algorithm is an attractive choice for achieving instruction-level parallelism for performance improvement.…”
Section: Key-authentication Protocol (Ecdh)mentioning
confidence: 99%
See 2 more Smart Citations
“…The communication between the sender and receiver only decrypts the message by the secure key. One-way function follows a sort of calculation where you can compute a result for information [15]. Notwithstanding, it is hypothetically difficult to get the individual contribution from an arbitrary outcome.…”
Section: B Alternativesmentioning
confidence: 99%