2021
DOI: 10.3390/electronics10091080
|View full text |Cite
|
Sign up to set email alerts
|

A Low-Complexity Edward-Curve Point Multiplication Architecture

Abstract: The Binary Edwards Curves (BEC) are becoming more and more important, as compared to other forms of elliptic curves, thanks to their faster operations and resistance against side channel attacks. This work provides a low-complexity architecture for point multiplication computations using BEC over GF(2233). There are three major contributions in this article. The first contribution is the reduction of instruction-level complexity for unified point addition and point doubling laws by eliminating multiple operati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
37
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 15 publications
(37 citation statements)
references
References 32 publications
0
37
0
Order By: Relevance
“…This multiplier executes and offers low memory and low power. Sajid et al [10] proposed the reduction of complexity at the instruction level for unified PD and PA operation. The design uses the execution of multiple functions in a single instruction format.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…This multiplier executes and offers low memory and low power. Sajid et al [10] proposed the reduction of complexity at the instruction level for unified PD and PA operation. The design uses the execution of multiple functions in a single instruction format.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The most time-consuming and dominant function in ECC is elliptic curve scalar multiplication (ECSM) and it is presented as Q=kP; where Q is another point on the elliptic curve, P is defined as a base point on an elliptic curve, and k is a scalar. The primary goal of the PM is to multiply the private key and fundamental point on the elliptic curve to determine the public key [10].…”
mentioning
confidence: 99%
“…Similarly, P is the initial point on the defined curve. To perform a PM operation, there are several algorithms, i.e., Double and Add (recently employed in [27]), Montgomery (utilized in [14,19,21,24]), Lopez Dahab (implemented in [18]), and many more. A comprehensive comparison over hardware implementations of various PM algorithms is presented in [2].…”
Section: Background For Pm Computationmentioning
confidence: 99%
“…Therefore, multiple inversion methods can be considered. However, the Itoh-Tsujii inversion algorithm is more frequently utilized as it requires only the multiplications and square operations for the computation [14,18,19,21,22,24,27]. Based on this consideration, we used similar hardware resources of our employed multiplier and squarer architectures to perform the required inversion operations to implement Algorithm 1.…”
Section: Adder Squarer and Multipliermentioning
confidence: 99%
“…It can potentially increase the resistance to SPA attacks [13,14]. In this context, Binary Edwards curves [15], which are known for their ability to resist side-channel attacks, are being increasingly used in various high-security applications. Compared to Binary Huff curves [16] and Hessian curves [17], Binary Edwards curves are not only faster and more secure, but also have a smaller key size and require less computational resources, making them ideal for constrained environments [6].…”
Section: Introductionmentioning
confidence: 99%