2020
DOI: 10.3390/s20185148
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of High-Performance ECC Processor with Unified Point Addition on Twisted Edwards Curve

Abstract: With the swift evolution of wireless technologies, the demand for the Internet of Things (IoT) security is rising immensely. Elliptic curve cryptography (ECC) provides an attractive solution to fulfill this demand. In recent years, Edwards curves have gained widespread acceptance in digital signatures and ECC due to their faster group operations and higher resistance against side-channel attacks (SCAs) than that of the Weierstrass form of elliptic curves. In this paper, we propose a high-speed, low-area, simpl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
52
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 35 publications
(52 citation statements)
references
References 54 publications
0
52
0
Order By: Relevance
“…It offers area-efficient hardware architecture for digital signature verification with its reconfigurable platform implementation. [4] Due to high resistance to SCAs and simplicity, the Edwards curve is gaining enormous interest among security researchers [23]. ECPM is quicker and more stable on Edwards curves than on elliptical curves in the Weierstrass form [24].…”
Section: Edwards Curvesmentioning
confidence: 99%
See 4 more Smart Citations
“…It offers area-efficient hardware architecture for digital signature verification with its reconfigurable platform implementation. [4] Due to high resistance to SCAs and simplicity, the Edwards curve is gaining enormous interest among security researchers [23]. ECPM is quicker and more stable on Edwards curves than on elliptical curves in the Weierstrass form [24].…”
Section: Edwards Curvesmentioning
confidence: 99%
“…To perform ECPM, distinct hardware architectures for PA and PD are not necessary. Moreover, through rendering the secret key identical to power tracing, the unified PA prevents possible SPA attacks [4]. Implementing the Twisted Edward curve can use the unified formula for both doubling and addition, thereby implementing side-channel security [26][27].…”
Section: Edwards Curvesmentioning
confidence: 99%
See 3 more Smart Citations