High-speed ECC processor over NIST prime fields applied with Toom–Cook multiplication

J Ding, S Li, Z Gu - IEEE Transactions on Circuits and Systems I …, 2018 - ieeexplore.ieee.org
In this paper, a high-speed elliptic curve cryptography (ECC) processor specialized for
primes recommended by the National Institute of Standards and Technology (NIST) was …

An efficient FPGA implementation of ECC modular inversion over F256

X Dong, L Zhang, X Gao - … of the 2nd International Conference on …, 2018 - dl.acm.org
Elliptic Curve Cryptography (ECC) provides high security levels with shorter keys than other
public-key cryptosystems such as RSA. Usually modular inversion operation is a choke point …

Evaluation of Libraries and Typical Embedded Systems for ECDSA Signature Verification for Car2X Communication

M Kramer, F Gerstmayer… - 2018 IEEE 23rd …, 2018 - ieeexplore.ieee.org
Over the last decades, cars have become more and more prevalent and play an important
role in our modern society. With the continuously growing number of vehicles, also the …

Efficient FPGA design of exception-free generic elliptic curve cryptosystems

K Tanaka, A Miyaji, Y Jin - … on Applied Cryptography and Network Security, 2021 - Springer
Elliptic curve cryptography (ECC) is one of promising cryptosystems in embedded systems
as it provides high security levels with short keys. Scalar multiplication is a dominating and …

ASIC implementation for an ECC processor

지장현, 김호원 - IDEC Journal of Integrated Circuits and Systems, 2018 - dbpia.co.kr
The designed elliptic curve cryptography (ECC) processor was developed for elliptic curve
digital signature algorithm (ECDSA) and elliptic curve diffie-hellman (ECDH). Currently, the …

Design And Implementation of Digital Signature Architecture Based on Chaos and SM2

S Wang, Z Tong, Q Liu, Z Yang - ISCTT 2022; 7th International …, 2022 - ieeexplore.ieee.org
In order to avoid the key leakage caused by the attack and destroy the security of the
password, this paper mainly proposes the design and implementation of an improved digital …

An Elliptic Curve Cryptographic Coprocessor for Resource-Constrained Systems with Arithmetic over Solinas Primes and Arbitrary Prime Fields

JP Thiers, M Safieh… - 2020 Zooming Innovation …, 2020 - ieeexplore.ieee.org
Many resource-constrained systems still rely on symmetric cryptography for verification and
authentication. Asymmetric cryptographic systems provide higher security levels, but are …

Dual Field ECC Processor for Iot Applications

A Peri, A Shah, A Pradhan, D Thakare… - ICT for Competitive …, 2020 - taylorfrancis.com
Security has become an important aspect of modern world applications. Recent years have
seen a massive increase in the development of IoT domain. However, the security has …