Paper 2015/1218
Efficient Hardware Implementation of Elliptic Curve Cryptosystem
Anissa Sghaier, Medien Zeghid, Belgacem Bouallegue, Adel Baganne, and Mohsen Machhout
Abstract
The strength of ECC lies in the hardness of elliptic curve discrete
logarithm problem (ECDLP) and the high level security with
significantly smaller keys. Thus, using smaller key sizes is a gain
in term of speed, power, bandwidth, and storage. Point
multiplication is the most common operation in ECC and the most used
method to compute it is Montgomery Algorithm. This paper describes
an area-efficient hardware implementation of Elliptic Curve
Cryptography (ECC) over
Metadata
- Available format(s)
- -- withdrawn --
- Publication info
- Preprint. MINOR revision.
- Keywords
- Elliptic Curves Cryptosystems(ECC)RSAASICDiscrete Logarithm (DL)memory resources
- Contact author(s)
- sghaieranissa @ yahoo com
- History
- 2017-04-17: withdrawn
- 2015-12-21: received
- See all versions
- Short URL
- https://ia.cr/2015/1218
- License
-
CC BY