2021
DOI: 10.3390/electronics10111252
|View full text |Cite
|
Sign up to set email alerts
|

FPGA Implementation of High-Efficiency ECC Point Multiplication Circuit

Abstract: The authentication of Internet of Things (IoT) devices based on the Physical Unclonable Function (PUF) is widely adopted in the information security domain. However, the leakage of PUF responses in an authentication system reduces its privacy and security. To improve its security, we can utilize the Elliptic Curve Cryptography (ECC) algorithm with different key lengths to encrypt the PUF response arbitrarily. Point multiplication is the most time-consuming operation in ECC because of its complex calculation pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(14 citation statements)
references
References 15 publications
0
14
0
Order By: Relevance
“…As compared to [11,17] our design saves 41.69% and 63.9% of FPGA slices and shows 30% and 35% efficiency improvement, respectively. Moreover, our design implemented on Virtex 5 and Virtex 6 outperforms [10,12,33] in terms of efficiency.…”
Section: Implementation Results Over Gf(2 409 )mentioning
confidence: 98%
See 1 more Smart Citation
“…As compared to [11,17] our design saves 41.69% and 63.9% of FPGA slices and shows 30% and 35% efficiency improvement, respectively. Moreover, our design implemented on Virtex 5 and Virtex 6 outperforms [10,12,33] in terms of efficiency.…”
Section: Implementation Results Over Gf(2 409 )mentioning
confidence: 98%
“…Compared to [15,21], it saves 3045 slices and 4934 slices, respectively. Compared to [10,12,33], our design implemented on Virtex 5 shows the higher efficiency.…”
Section: Implementation Results Over Gf(2 283 )mentioning
confidence: 99%
“…They have attained throughput over the area and GF (2233) on XilinxVirtex-7, Virtex-6, and Virtex-5 FPGA platforms. Zhao et al [17] proposed a point multiplier with a binary field and a reconfigurable secure key with prime field sizes of p-233, p-283, p-409, and p-571.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Radio-frequency identification networks (RFID) [9], [10], [11], internet-of-things (IoTs) [12], [13], [14], [15] and wireless sensor nodes (WSNs) [16] are typical examples of area-constrained cryptographic applications that demand low complexity H/W realization of the ECC's PM computation. Instead of these applications, other related applications are error correction codes [17], digital signal processors [18], network servers [19], etc.…”
Section: Introductionmentioning
confidence: 99%