A low-latency and low-complexity point-multiplication in ECC

R Salarifard, S Bayat-Sarmadi… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Elliptic curve cryptography (ECC) has received attention, because it can achieve the same
security level as other asymmetric methods while using a key with smaller length. Although …

Architectural review of polynomial bases finite field multipliers over GF(2m)

M Imran, M Rashid - … Computing and Digital Systems (C-CODE …, 2017 - ieeexplore.ieee.org
In elliptic curve cryptography (ECC), hardware architectures of finite field (FF) multipliers are
frequently proposed for polynomial as well as for normal bases representations over GF (2 …

High-speed hardware architecture of scalar multiplication for binary elliptic curve cryptosystems

B Rashidi, SM Sayedi, RR Farashahi - Microelectronics journal, 2016 - Elsevier
In this paper a hardware architecture of scalar multiplication based on Montgomery ladder
algorithm for binary elliptic curve cryptography is presented. In the proposed architecture …

High-speed hardware implementations of point multiplication for binary Edwards and generalized Hessian curves

B Rashidi, RR Farashahi, SM Sayedi - Cryptology ePrint Archive, 2017 - eprint.iacr.org
In this paper high-speed hardware architectures of point multiplication based on
Montgomery ladder algorithm for binary Edwards and generalized Hessian curves in …

[PDF][PDF] Hardware implementation of efficient elliptic curve scalar multiplication using vedic multiplier

RK Kadu, DS Adane - International Journal of Communication …, 2019 - academia.edu
FPGA implementation of scalar multiplication using a Vedic multiplier. Scalar multiplication
is the most important operation in Elliptic Curve Cryptography (ECC), which used for public …

Implementation of Boneh-Lynn-Shacham short digital signature scheme using Weil bilinear pairing based on supersingular elliptic curves

NQ Luc, QT Do, MH Le - Vietnam Journal of Science …, 2022 - vietnamscience.vjst.vn
One option for a digital signature solution for devices with low memory and low bandwidth
transmission over channels uses a short digital signature scheme based on Weil bilinear …

[PDF][PDF] A novel efficient hardware implementation of elliptic curve cryptography scalar multiplication using vedic multiplier

RK Kadu, DS Adane - International Journal of Simulation: Systems …, 2018 - academia.edu
A Novel Efficient Hardware Implementation of Elliptic Curve Cryptography Scalar Multiplication
using Vedic Multiplier Page 1 RAKESH K. KADU et al: A NOVEL EFFICIENT HARDWARE …

Systolic design space exploration of EEA-based inversion over binary and ternary fields

I Hazmi - 2018 - dspace.library.uvic.ca
Cryptographic protocols are implemented in hardware to ensure low-area, high speed and
reduced power consumption especially for mobile devices. Elliptic Curve Cryptography …

Hardware Implementation of Elliptic Curve Cryptosystem Using Optimized Scalar Multiplication

RK Kadu, DS Adane - Smart Trends in Computing and Communications …, 2019 - Springer
This paper presents a hardware implementation of Elliptic Curve Cryptography (ECC) with
optimized scalar multiplication. In elliptic curve cryptography, scalar multiplication is an …

Elliptic curve cryptography in hardware for secure systems: a multi-use reconfigurable soft IP

BF Ferreira - 2014 - meriva.pucrs.br
Nos últimos anos, a indústria tem desenvolvido e colocado no mercado uma grande
quantidade de dispositivos que são capazes de acessar a Internet e outras redes. Isso está …