2015
DOI: 10.1016/j.micpro.2015.02.003
|View full text |Cite
|
Sign up to set email alerts
|

Review of Elliptic Curve Cryptography processor designs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
21
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 41 publications
(21 citation statements)
references
References 68 publications
0
21
0
Order By: Relevance
“…To avoid being exhaustive on the topic, we focus on more recent hardware implementations of ECC over prime fields. For those interested more generally in the topic, a recent survey is done by Marzouqi et al [15].…”
Section: Ecc Hardware Implementationsmentioning
confidence: 99%
“…To avoid being exhaustive on the topic, we focus on more recent hardware implementations of ECC over prime fields. For those interested more generally in the topic, a recent survey is done by Marzouqi et al [15].…”
Section: Ecc Hardware Implementationsmentioning
confidence: 99%
“…Anywhere, anytime and with anything it can be connected. To any range of traditionally dumb or non-internet-enabled physical devices and everyday objects are included by extending internet connectivity beyond standard devices like desktops, laptops, smart phones and tablets [2]. Over the internet these devices can communicate and interact also they can be remotely monitored and controlled embedded with the technology.…”
Section: Introductionmentioning
confidence: 99%
“…Many hardware implementations of ECC have been proposed [6][7][8][9][10][11][12][13][14][15][16][17][18] for ECC. The accelerator of modular multiplication (MM) can be divided into two categories: multiplier-based architecture and adder-based architectures.…”
Section: Introductionmentioning
confidence: 99%