Area-Efficient Realization of Binary Elliptic Curve Point Multiplication Processor for Cryptographic Applications

A Aljaedi, SS Jamal, M Rashid, AR Alharbi, M Alotaibi… - Applied Sciences, 2023 - mdpi.com
This paper proposes a novel hardware design for a compact crypto processor devoted to
elliptic-curve point multiplication over GF (2 233). We focus on minimizing hardware usage …

Iot based smart energy management in residential applications

MR Hasan, E Hossain, HMR Faruque… - 2019 1st International …, 2019 - ieeexplore.ieee.org
The lack of credibility of data acquired through traditional means from a conventional
metering system has reduced the efficacy of the energy management system. For …

可重构的素域SM2 算法优化方法

李斌, 周清雷, 陈晓杰, 冯峰 - 通信学报, 2022 - infocomm-journal.com
针对SM2 算法软件效率低, 硬件实现资源利用率低, 可扩展性差的问题, 提出了一种可重构的素
域SM2 算法优化方法. 通过对SM2 算法的深入分析, 从不同计算阶段和计算特点着手 …

低功耗嵌入式平台的SM2 国密算法优化实现

刘赣秦, 李晖, 朱辉, 黄煜坤, 刘兴东 - 网络与信息安全学报, 2022 - infocomm-journal.com
随着无线通信技术的发展和智能终端的普及, 越来越多的密码算法被应用到物联网设备中以保障
通信安全和数据安全, 其中, 由国家密码管理局提出的SM2 椭圆曲线公钥密码算法作为我国自主 …

An Optimized Flexible Accelerator for Elliptic Curve Point Multiplication over NIST Binary Fields

A Aljaedi, M Rashid, SS Jamal, AR Alharbi, M Alotaibi - Applied Sciences, 2023 - mdpi.com
This article proposes a flexible hardware accelerator optimized from a throughput and area
point of view for the computationally intensive part of elliptic curve cryptography. The target …

Saddle: Secure aerial data delivery with lightweight encryption

A Demeri, W Diehl, A Salman - Intelligent Computing: Proceedings of the …, 2020 - Springer
Low-cost devices in the Internet of Things (IoT) can be integrated into Unmanned Aerial
Systems (UAS) as a means of collecting remote data and forwarding to central collection …

FPGA Implementation of Elliptic Curve Point Multiplication for a 256-bit Processor on NIST Prime Field

MAI Romel, MR Islam, FK Fattah - 2023 14th International …, 2023 - ieeexplore.ieee.org
Elliptic curve cryptography (ECC) has long been a prevailing technique among security
researchers for developing security architectures of digital devices to their hardware levels …

Efficient Multiplier Architecture for ECC Core

GN Swetha, AM Sandi - 2021 6th International Conference on …, 2021 - ieeexplore.ieee.org
High significance of elliptic Curve Cryptography (ECC) has been seen in many applications
over the years since its development in 1986. ECC is widely utilized for security academies …

Prove You Owned Me: One Step beyond RFID Tag/Mutual Authentication

S Cai, Y Li, C Ma, SSM Chow, RH Deng - arXiv preprint arXiv:2210.10244, 2022 - arxiv.org
Radio Frequency Identification (RFID) is a key technology used in many applications. In the
past decades, plenty of secure and privacy-preserving RFID tag/mutual authentication …

A Secure Fusion: Elliptic Curve Encryption Integrated with LSB Steganography for Hidden Communication

H El-Taj - … Journal of Computational and Experimental Science …, 2024 - ijcesen.com
A Secure Fusion: Elliptic Curve Encryption Integrated with LSB Steganography for Hidden
Communication Page 1 Copyright © IJCESEN International Journal of Computational and …