2021
DOI: 10.3390/electronics10212698
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Low-Area Point Multiplication Architecture for Elliptic-Curve Cryptography

Abstract: This paper presents a Point Multiplication (PM) architecture of Elliptic-Curve Cryptography (ECC) over GF(2163) with a focus on the optimization of hardware resources and latency at the same time. The hardware resources are reduced with the use of a bit-serial (traditional schoolbook) multiplication method. Similarly, the latency is optimized with the reduction in a critical path using pipeline registers. To cope with the pipelining, we propose to reschedule point addition and double instructions, required for… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 32 publications
0
6
0
Order By: Relevance
“…Another protocol Adaptive HH-VBF (AHH-VBF) [19] based on HH-VBF was proposed, focuses on adaptively modifying pipelines in sparse and dense sensor networks. Also, in [29], a Point Multiplication (PM) is presented and mainly focusing on the optimization and latency of the hardware resources by using bit-serial method and on the reduction of the pipeline registers. The efficacy of the route was increased by Energy Scaled and Expended VBF (ESEVBF) [20]; through rescheduling the holding duration of the nodes in accordance with the remaining energy and, if necessary, suppressing more packets.…”
Section: Vector Based Routing Protocolsmentioning
confidence: 99%
“…Another protocol Adaptive HH-VBF (AHH-VBF) [19] based on HH-VBF was proposed, focuses on adaptively modifying pipelines in sparse and dense sensor networks. Also, in [29], a Point Multiplication (PM) is presented and mainly focusing on the optimization and latency of the hardware resources by using bit-serial method and on the reduction of the pipeline registers. The efficacy of the route was increased by Energy Scaled and Expended VBF (ESEVBF) [20]; through rescheduling the holding duration of the nodes in accordance with the remaining energy and, if necessary, suppressing more packets.…”
Section: Vector Based Routing Protocolsmentioning
confidence: 99%
“…− Character "F" of cipher text is represented by point (17,8) which is equal to 6P. We calculate 𝑃 0 = 𝐷(𝐶 𝑖 ) = [(6 − 21) 𝑚𝑜𝑑 28]𝑃 = 13𝑃 = 13(0, 6) = (16,5) represented by character M. − Character "K" of cipher text is represented by point (15,14) which is equal to 6P.…”
Section: Decryption Processmentioning
confidence: 99%
“…According to [8] based on elliptic curve cryptography to analysis of a secure communication for healthcare system using wearable devices. A new study of the curve is low-area point multiplication architecture and secured data storage using deduplication in cloud computing for ECC [14], [15]. ECC are also used in big data analysis [16].…”
Section: Introductionmentioning
confidence: 99%
“…The choice of particular mathematical formulas depends on the specific requirements of the application and the trade-off between performance and security. For example, BHC and BEC are defined over binary fields and are considered more appropriate for area-constrained applications [15,16]. HC, on the other hand, is defined over higher-dimensional fields and offers a higher resistance to side-channel attacks.…”
Section: Introductionmentioning
confidence: 99%