2008
DOI: 10.1109/tc.2008.148
|View full text |Cite
|
Sign up to set email alerts
|

Elliptic-Curve-Based Security Processor for RFID

Abstract: Abstract-RFID (Radio Frequency IDentification) tags need to include security functions, yet at the same time their resources are extremely limited. Moreover, to provide privacy, authentication and protection against tracking of RFID tags without loosing the system scalability, a public-key based approach is inevitable. In this paper, we present an architecture of a state-of-the-art processor for RFID tags with an Elliptic Curve (EC) processor over GF(2 163 ). It shows the plausibility of meeting both security … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
164
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 187 publications
(164 citation statements)
references
References 16 publications
0
164
0
Order By: Relevance
“…Lee et al [26] use digit-serial multipliers, while Hein et al use a 16 Â 16 GFð2Þ multiplier and 32-bit accumulator. Comparing the implementation in [26], using a 16 Â 16-bit multiplier requires less area, lower power consumption.…”
Section: Results and Comparisonmentioning
confidence: 99%
See 2 more Smart Citations
“…Lee et al [26] use digit-serial multipliers, while Hein et al use a 16 Â 16 GFð2Þ multiplier and 32-bit accumulator. Comparing the implementation in [26], using a 16 Â 16-bit multiplier requires less area, lower power consumption.…”
Section: Results and Comparisonmentioning
confidence: 99%
“…Lee et al [26] use digit-serial multipliers, while Hein et al use a 16 Â 16 GFð2Þ multiplier and 32-bit accumulator. Comparing the implementation in [26], using a 16 Â 16-bit multiplier requires less area, lower power consumption. On the other hand, it requires 296k clock cycles, twice as many as Lee's ECC processor (and our HECC processor), for one scalar multiplication, and its energy consumption is about six times higher.…”
Section: Results and Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…For instance, Elliptic Curve Cryptosystem (ECC) was implemented for RFID tags [13,16]. According to [1], a passive RFID tag should have power consumption less than 15 µW to guarantee a 1 meter operation range.…”
Section: Introductionmentioning
confidence: 99%
“…Some ECC implementations can already fulfill the requirements. For example, ECC processor proposed by Lee et al [16], using 15.4 kGates with 130 nm technology, consumes 12.08 µW when running at 323 kHz, and one scalar multiplication takes only 243 ms. The ECC core proposed by Hein et al [13] consumes 10.08 µW when running at 106 kHz.…”
Section: Introductionmentioning
confidence: 99%