Paper 2016/712

A Survey of Hardware Implementations of Elliptic Curve Cryptographic Systems

Basel Halak, Said Subhan Waizi, and Asad Islam


Elliptic Curve Cryptography (ECC) has gained much recognition over the last decades and has established itself among the well known public-key cryptography schemes, not least due its smaller key size and relatively lower computational effort compared to RSA. The wide employment of Elliptic Curve Cryptography in many different application areas has been leading to a variety of implementation types and domains ranging from pure software approaches over hardware implementations to hardware/software co-designs. The following review provides an overview of state of the art hardware implementations of ECC, specifically in regard to their targeted design goals. In this context the suitability of the hardware/software approach in regard to the security challenges opposed by the low-end embedded devices of the Internet of Things is briefly examined. The paper also outlines ECC’s vulnerability against quantum attacks and references one possible solution to that problem.

Available format(s)
Publication info
Preprint. MINOR revision.
Elliptic Curve Cryptographypublic keycryptoprocessorcryptographic coprocessorinstruction set extensionhardwaresoftware codesign
Contact author(s)
bh9 @ ecs soton ac uk
2016-07-21: received
Short URL
Creative Commons Attribution


      author = {Basel Halak and Said Subhan Waizi and Asad Islam},
      title = {A Survey of Hardware Implementations of Elliptic Curve Cryptographic Systems},
      howpublished = {Cryptology ePrint Archive, Paper 2016/712},
      year = {2016},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.