2021
DOI: 10.1109/access.2021.3051282
|View full text |Cite
|
Sign up to set email alerts
|

Innovative Dual-Binary-Field Architecture for Point Multiplication of Elliptic Curve Cryptography

Abstract: High-performance Elliptic Curve Cryptography (ECC) implementation in encryption authentication severs has become a challenge due to the explosive growth of e-commerce's demand for speed and security. Point multiplication (PM) is the most common and complex operation in ECC which directly determines the performance of the whole system. This article proposes a 6CC-6CC (clock cycle) dual-field PM architecture and a 6CC-4CC dual-field PM architecture based on maximizing utilization of Karatsuba multipliers and re-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 46 publications
0
11
0
Order By: Relevance
“…The SPA attacks for Weierstrass model are counter measured using Montgomery ladder PM algorithm [5]. In addition to it, the PA and PD computations are exactly similar in Weierstrass model.…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…The SPA attacks for Weierstrass model are counter measured using Montgomery ladder PM algorithm [5]. In addition to it, the PA and PD computations are exactly similar in Weierstrass model.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, asymmetric algorithms employ some mathematical problems which are difficult to resolve [3]. Rivest Shamir Adleman (RSA) [4] and Elliptic Curve Cryptography (ECC) [5] are the frequently used asymmetric algorithms. The security strength of RSA and ECC is based on solving the prime numbers using exponential and logarithms respectively.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations