Area-Time Efficient Hardware Implementation of Elliptic Curve Cryptosystem

Abstract

The strength of ECC lies in the hardness of elliptic curve discrete logarithm problem (ECDLP) and the hight level security with significantly smaller keys. Thus, using smaller key sizes is a gain in term of speed, power, bandwidth, and storage. Point multiplication is the most common operation in ECC and the most used method to compute it is Montgomery… (More)

Topics

14 Figures and Tables

Statistics

0204020162017
Citations per Year

Citation Velocity: 12

Averaging 12 citations per year over the last 2 years.

Learn more about how we calculate this metric in our FAQ.