DOI: 10.1007/978-3-540-73275-4_6
|View full text |Cite
|
Sign up to set email alerts
|

Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes

Abstract: In this article we present the fastest known implementation of a modular multiplication for a 160-bit standard compliant elliptic curve (secp160r1) for 8-bit micro controller which are typically used in WSNs. The major part (77%) of the processing time for an elliptic curve operation such as ECDSA or EC Diffie-Hellman is spent on modular multiplication. We present an optimized arithmetic algorithm which significantly speed up ECC schemes. The reduced processing time also yields a significantly lower energy con… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
30
0
2

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 42 publications
(32 citation statements)
references
References 11 publications
0
30
0
2
Order By: Relevance
“…Code size Scalable RSA ECC Speed record Multi-precision multiplication on 8-bit AVR processors: Gura et al [9] n/a Hutter et al [11] 3.1-7.6 kB (U) Hutter et al (L) [12] 1.5-1.9 kB Hutter et al (U) [12] 3.7-151 kB Liu et al [16] n/a Scott et al [19] n/a Seo et al [21] 3.6-10 kB Uhsadel et al [23] n/a Zhang et al [24] n/a This work (RPS mul) 918 B (L,P)…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Code size Scalable RSA ECC Speed record Multi-precision multiplication on 8-bit AVR processors: Gura et al [9] n/a Hutter et al [11] 3.1-7.6 kB (U) Hutter et al (L) [12] 1.5-1.9 kB Hutter et al (U) [12] 3.7-151 kB Liu et al [16] n/a Scott et al [19] n/a Seo et al [21] 3.6-10 kB Uhsadel et al [23] n/a Zhang et al [24] n/a This work (RPS mul) 918 B (L,P)…”
Section: Methodsmentioning
confidence: 99%
“…update of a loop counter or execution of a branch instruction) and allows for a specific "tuning" of each iteration (see e.g. [23,19]), which is not possible with "rolled" loops. A second line of research focused on speeding up the innerloop operation, i.e.…”
Section: Introductionmentioning
confidence: 99%
“…It is known that the dominant cost in EC-based cryptographic operations is point multiplications [10]. On the other hand, modular addition, modular multiplication, SHA-1 and AES operations are roughly three to four orders of magnitude faster than a point multiplication evaluation [31]. Hence, in our analysis, we consider only elliptic curve point multiplication (such as r · P) and elliptic curve double multiplication (such as r · P + w · V).…”
Section: Efficiency Analysismentioning
confidence: 99%
“…The majority of research focussed on advancing the hybrid multiplication technique or devising more efficient variants of it. An example is the work of Uhsadel et al [37], who improved the handling of carry bits in the hybrid method and managed to achieve an execution time of 2881 cycles for a (160 × 160)-bit multiplication (without modular reduction), which is about 7.3% faster than Gura et al's original implementation (3106 cycles). Zhang et al [43] re-arranged the sequence in which the byte-by-byte multiplications are carried out and measured an execution time of 2846 clock cycles.…”
Section: Past Work On Lightweight Ecc For 8-bit Processorsmentioning
confidence: 99%