2019
DOI: 10.1109/tcsii.2018.2867618
|View full text |Cite
|
Sign up to set email alerts
|

A Novel and High-Performance Modular Square Scheme for Elliptic Curve Cryptography Over GF(${p}$ )

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…The design in [33] reaches good performance in terms of area occupation but lower speed with respect to our work. The modular square method proposed in [23] allows good performance and an AT similar to the one achieved by our crypto-processor. The work in [22] is a low hardware consumption design for ECC.…”
Section: Discussion and Comparisonmentioning
confidence: 96%
See 3 more Smart Citations
“…The design in [33] reaches good performance in terms of area occupation but lower speed with respect to our work. The modular square method proposed in [23] allows good performance and an AT similar to the one achieved by our crypto-processor. The work in [22] is a low hardware consumption design for ECC.…”
Section: Discussion and Comparisonmentioning
confidence: 96%
“…In this case, no experimental results have been provided to test the SPA resistance, but the authors claim their solution works well. Works in [23,33] do not implement any countermeasure against side-channel attacks. The design in [33] reaches good performance in terms of area occupation but lower speed with respect to our work.…”
Section: Discussion and Comparisonmentioning
confidence: 99%
See 2 more Smart Citations
“…In [ 16 , 17 ], the fast partial Montgomery reduction algorithm achieved better performance and a more balanced area. In contrast to the majority of works centered on modular multiplication, the authors in [ 18 ] presented a low-complexity modular squaring scheme to decrease the cycle time required for point multiplication. Additionally, some studies focused on binary field curves [ 19 , 20 ], but the NIST- p 256 curve is a better choice because it is a widely adopted and standardized elliptic curve, offering strong security and compatibility with various cryptographic protocols.…”
Section: Introductionmentioning
confidence: 99%