2003
DOI: 10.1016/s0167-9260(02)00053-6
|View full text |Cite
|
Sign up to set email alerts
|

Hardware architectures for public key cryptography

Abstract: This paper presents an overview of hardware implementations for the two commonly used types of Public Key Cryptography, i.e. RSA and Elliptic Curve Cryptography (ECC), both based on modular arithmetic. We first discuss the mathematical background and the algorithms to implement these cryptosystems. Next an overview is given of the different hardware architectures which have been proposed in the literature.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
50
0
3

Year Published

2004
2004
2024
2024

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 80 publications
(53 citation statements)
references
References 182 publications
(219 reference statements)
0
50
0
3
Order By: Relevance
“…-The 56-bit DES keys are transmitted encrypted using an asymmetric public-key scheme, in our case Elliptic Curve Cryptography. In the field of public-key cryptography, Elliptic Curves (ECs) have performance and keysize advantages over the RSA scheme [16]. We therefore choose them for our design.…”
Section: Developing Cryptography On Poly-si Tftsmentioning
confidence: 99%
“…-The 56-bit DES keys are transmitted encrypted using an asymmetric public-key scheme, in our case Elliptic Curve Cryptography. In the field of public-key cryptography, Elliptic Curves (ECs) have performance and keysize advantages over the RSA scheme [16]. We therefore choose them for our design.…”
Section: Developing Cryptography On Poly-si Tftsmentioning
confidence: 99%
“…The multiplier they use is a digit-serial shift-and-add multiplier. For a detailed survey of finite field multipliers and processors for PKC see [25].…”
Section: Previous Work On Hardware Implementations Of Eccmentioning
confidence: 99%
“…All three operations, doubling, addition, and subtraction are used in the point multiplication algorithm. Figure 1 shows the point multiplication algorithm [8] that is based on the signed digit representation of integer k and is considered to be a faster point multiplication algorithm compared to the algorithm based on the regular binary representation [9]. This algorithm uses the elliptic curve group operations (double, addition, and subtract) based on the underlying Galois Field.…”
Section: Elliptic Curve Cryptosystemmentioning
confidence: 99%