2020
DOI: 10.3390/s20051507
|View full text |Cite
|
Sign up to set email alerts
|

Elliptic Curve Cryptography for Wireless Sensor Networks Using the Number Theoretic Transform

Abstract: We implement elliptic curve cryptography on the MSP430 which is a commonly used microcontroller in wireless sensor network nodes. We use the number theoretic transform to perform finite field multiplication and squaring as required in elliptic curve scalar point multiplication. We take advantage of the fast Fourier transform for the first time in the literature to speed up the number theoretic transform for an efficient realization of elliptic curve cryptography. Our implementation achieves elliptic curve scal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
19
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(19 citation statements)
references
References 66 publications
0
19
0
Order By: Relevance
“…In a recent work, ECC is implemented using a different DFT based approach to realize GF (p m ) multiplications and squarings [39]. In [39], the FFT [30,35,36] is used to transform GF (p m ) elements into the frequency domain.…”
Section: Fast Fourier Transform Based Multiplicationmentioning
confidence: 99%
See 2 more Smart Citations
“…In a recent work, ECC is implemented using a different DFT based approach to realize GF (p m ) multiplications and squarings [39]. In [39], the FFT [30,35,36] is used to transform GF (p m ) elements into the frequency domain.…”
Section: Fast Fourier Transform Based Multiplicationmentioning
confidence: 99%
“…In a recent work, ECC is implemented using a different DFT based approach to realize GF (p m ) multiplications and squarings [39]. In [39], the FFT [30,35,36] is used to transform GF (p m ) elements into the frequency domain. Once the frequency domain representations for GF (p m ) elements are obtained, their polynomial multiplication is computed simply by pairwise multiplying their frequency domain coefficients.…”
Section: Fast Fourier Transform Based Multiplicationmentioning
confidence: 99%
See 1 more Smart Citation
“…To keep the communication between Internet of Things (IOT) devices secure, the data often require encryption before being transmitted [1], and true random number generators (TRNGs) are indispensable primary components in many encryption algorithms [2,3]. TRNGs usually extract random numbers from the outcome of non-deterministic physical processes, such as thermal noise of resistors [4], random jitter of clock signals [5], random telegraph noise (RTN) [6] and metastable oscillation of latch circuits [7].…”
Section: Introductionmentioning
confidence: 99%
“…In experimental evaluations, the min-entropy is usually regarded as the worst-case (i.e., the greatest lower bound) measure of randomness (entropy) for SRAM power-on values [20]. The min-entropy of every bit (bit i ) in the SRAM power-on sequence can be calculated by Equations (1) and (2). H…”
Section: Introductionmentioning
confidence: 99%