This research addresses the computationallyeffective implementation of cryptographic protocols based on elliptic curves, and targets in particular cryptosystems that should be hosted on embedded programmable processors. In principle, the implementation of Elliptic Curve Cryptography\ud (ECC) requires one to deal with different design options, which stem from the available degrees of freedom: elliptic curve family, coordinate system, and point multiplication procedure. On the other hand, theoretical studies already proved that exist only a few setups leading to computational efficient implementations. The goal of present paper is to analyze from an applicative point of view such setups, which mainly involve two specific\ud families of elliptic curves: Edwards curves and extend Jacobi quartic curves. The presented experimental session shows a few interesting outcomes; first, ECC schemes implemented by using either Edwards curves or extended Jacobi quartic curves can obtain remarkable performances in terms of computational efficiency also on low-cost, low-resources processors. Second, the experiments showed that in some cases the number of Fp operations is not enough to accurately estimate the overall performance of an ECC-based cryptosystem
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.