Area-Time Efficient Hardware Implementation of Elliptic Curve Cryptosystem


The strength of ECC lies in the hardness of elliptic curve discrete logarithm problem (ECDLP) and the hight level security with significantly smaller keys. Thus, using smaller key sizes is a gain in term of speed, power, bandwidth, and storage. Point multiplication is the most common operation in ECC and the most used method to compute it is Montgomery… (More)


14 Figures and Tables


Citations per Year

Citation Velocity: 12

Averaging 12 citations per year over the last 2 years.

Learn more about how we calculate this metric in our FAQ.