Lightweight elliptic curve cryptography accelerator for internet of things applications

CA Lara-Nino, A Diaz-Perez, M Morales-Sandoval - Ad Hoc Networks, 2020 - Elsevier
Authentication, encryption, signatures, and key agreements are public key cryptography
(PKC) services required in certain Internet of Things (IoT) applications (such as healthcare …

Field Programmable Gate Array based elliptic curve Menezes‐Qu‐Vanstone key agreement protocol realization using Physical Unclonable Function and true random …

NN Anandakumar, MS Hashmi… - IET Circuits, Devices & …, 2022 - Wiley Online Library
The trust, authenticity and integrity of Internet‐of‐Things (IoT) systems are heavily reliant on
Physical Unclonable Functions (PUFs) and True random number generators (TRNGs). The …

A survey on hardware implementations of elliptic curve cryptosystems

B Rashidi - arxiv preprint arxiv:1710.08336, 2017 - arxiv.org
In the past two decades, Elliptic Curve Cryptography (ECC) have become increasingly
advanced. ECC, with much smaller key sizes, offers equivalent security when compared to …

High performance HITA based Binary Edward Curve Crypto processor for FPGA platforms

M Kalaiarasi, VR Venkatasubramani… - Journal of Parallel and …, 2023 - Elsevier
In an embedded and resource-constrained environment, Elliptic Curve Cryptography (ECC)
has been noted as an efficient and suitable methodology for achieving information security …

An area-time efficient point-multiplication architecture for ECC over GF (2m) using polynomial basis

PKG Nadikuda, L Boppana - Microprocessors and Microsystems, 2022 - Elsevier
The modern age has seen an enormous progress in communications. Millions of devices
communicate over the web transmitting confidential information which sometimes is of …

Reconfigurable hardware architecture for authenticated key agreement protocol over binary edwards curve

NN Anandakumar, MPL Das, SK Sanadhya… - ACM Transactions on …, 2018 - dl.acm.org
In this article, we present a high-performance hardware architecture for Elliptic curve based
(authenticated) key agreement protocol “Elliptic Curve Menezes, Qu and …

Design and leakage assessment of side channel attack resistant binary edwards Elliptic Curve digital signature algorithm architectures

AP Fournaris, C Dimopoulos, A Moschos… - Microprocessors and …, 2019 - Elsevier
Abstract Considering that Elliptic Curve Digital Signature Algorithm (ECDSA)
implementations need to be efficient, flexible and Side Channel Attack (SCA) resistant, in …

Low area-time complexity point multiplication architecture for ECC over GF() using polynomial basis

PKG Nadikuda, L Boppana - Journal of Cryptographic Engineering, 2023 - Springer
In the present day, billions of devices communicate over the wireless networks. The massive
information transmitted over open ended, and unsecured Internet architecture results in …

Efficient hardware implementations of point multiplication for binary Edwards curves

B Rashidi - International Journal of Circuit Theory and …, 2018 - Wiley Online Library
This paper presents efficient and fast hardware implementations of the complete point
multiplication on binary Edwards curves (BECs). The implementations are based on …

A High Speed and Area Efficient Processor for Elliptic Curve Scalar Point Multiplication for GF()

M Thirumoorthi, AJ Leigh, M Heidarpur… - … Transactions on Very …, 2024 - ieeexplore.ieee.org
Binary polynomial multipliers impact the overall performance and cost of elliptic curve
cryptography (ECC) systems. Multiplication algorithms with subquadratic computational …