2019
DOI: 10.1007/s11227-018-02740-2
|View full text |Cite
|
Sign up to set email alerts
|

High-performance ECC processor architecture design for IoT security applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 43 publications
(26 citation statements)
references
References 25 publications
0
26
0
Order By: Relevance
“…Among these the AT and throughput values of Ref. [1]- [2] and [6] are approximately equal with our design.…”
Section: Results and Performance Analysismentioning
confidence: 67%
See 2 more Smart Citations
“…Among these the AT and throughput values of Ref. [1]- [2] and [6] are approximately equal with our design.…”
Section: Results and Performance Analysismentioning
confidence: 67%
“…So, we used throughput rate parameter and area-delay product (AT) parameter for comparison purposes. Table II, gives the simulated results and performance from various papers presented by Hossain et al [2], Liu et al [3], Lee et al [4], Vliegen [5], Ghosh et al [6], McIvor et al [7], Daly et al [8] and Kudithi et al [9]. We can observe that the results from Hossain et al [2] and Kudithi [9] are better in terms of area and computation time when compared with other literature results.…”
Section: Results and Performance Analysismentioning
confidence: 78%
See 1 more Smart Citation
“…The technique proposed to implement multiplicative inverse design attained an operating frequency of 137.22 MHz with resource utilization of only 900 slices over GF (256). In [37], [39] works implemented using virtex-7 device showcased higher speed but with increased area consumption. Other designs [38], [40], [41] synthesized using virtex-5 and virtex-2 FPGA had lower performance in terms of both slices and frequency of execution.…”
Section: Implementation Resultsmentioning
confidence: 99%
“…In [30], the parallel architecture depends on using the Montgomery ladder for field GF 2 191 but with Karatsuba-Ofman for the polynomial multiplier and Extended Euclidian Algorithm (EEA) for the inversion. However, the work in [31] presented an ECCP architecture design for IoT securityusing the Montgomery ladder algorithm running sequentially. All previous works results appeared in Fig.2.…”
Section: Related Workmentioning
confidence: 99%