A review of techniques for implementing elliptic curve point multiplication on hardware

A Verri Lucca, GA Mariano Sborz… - Journal of Sensor and …, 2020 - mdpi.com
Cryptography is considered indispensable among security measures applied to data
concerning insecure means of transmission. Among various existent algorithms on …

A systematic literature review and meta-analysis on scalable blockchain-based electronic voting systems

U Jafar, MJ Ab Aziz, Z Shukur, HA Hussain - Sensors, 2022 - mdpi.com
Electronic voting systems must find solutions to various issues with authentication, data
privacy and integrity, transparency, and verifiability. On the other hand, Blockchain …

A secure lightweight fuzzy embedder based user authentication scheme for internet of medical things applications

R Praveen, P Pabitha - Journal of Intelligent & Fuzzy Systems, 2023 - content.iospress.com
Abstract The Internet of Medical Things (IoMT) is a network of medical devices, hardware
infrastructure, and software that allows healthcare information technology to be …

High throughput and low area architectures of secure IoT algorithm for medical image encryption

Z Mishra, B Acharya - Journal of Information Security and Applications, 2020 - Elsevier
The favor that lightweight encryption algorithms have gained over the recent years regarding
data and image security in a resource constrained environment of the smart device sort in …

Flexible architectures for cryptographic algorithms—A systematic literature review

M Rashid, M Imran, AR Jafri… - Journal of Circuits …, 2019 - World Scientific
Symmetric and asymmetric cryptographic algorithms are used for a secure transmission of
data over an unsecured public channel. In order to use these algorithms in real-time …

A Systematic Review of Fast, Scalable, and Efficient Hardware Implementations of Elliptic Curve Cryptography for Blockchain

R Ifrim, D Loghin, D Popescu - ACM Transactions on Reconfigurable …, 2024 - dl.acm.org
Blockchain technology entered the enterprise domain under the name of permissioned
blockchains and hybrid or verifiable database systems, as they provide a distributed solution …

A hybrid approach for efficient and secure point multiplication on binary edwards curves

A Sajid, OS Sonbul, M Rashid, MYI Zia - Applied Sciences, 2023 - mdpi.com
The focus of this article is to present a novel crypto-accelerator architecture for a resource-
constrained embedded system that utilizes elliptic curve cryptography (ECC). The …

Innovative dual-binary-field architecture for point multiplication of elliptic curve cryptography

J Li, W Wang, J Zhang, Y Luo, S Ren - IEEE Access, 2021 - ieeexplore.ieee.org
High-performance Elliptic Curve Cryptography (ECC) implementation in encryption
authentication severs has become a challenge due to the explosive growth of e-commerce's …

High-Performance ECC Scalar Multiplication Architecture Based on Comb Method and Low-Latency Window Recoding Algorithm

J Zhang, Z Chen, M Ma, R Jiang, H Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Elliptic curve scalar multiplication (ECSM) is the essential operation in elliptic curve
cryptography (ECC) for achieving high performance and security. We introduce a novel high …

Survey: Vulnerability analysis of low-cost ECC-based RFID protocols against wireless and side-channel attacks

S Gabsi, V Beroulle, Y Kieffer, HM Dao, Y Kortli… - Sensors, 2021 - mdpi.com
The radio frequency identification (RFID) system is one of the most important technologies of
the Internet of Things (IoT) that tracks single or multiple objects. This technology is …