Hardware Implementations of Elliptic Curve Cryptography Using Shift-Sub Based Modular Multiplication Algorithms

Elliptic curve cryptography (ECC) over prime fields relies on scalar point multiplication realized by point addition and point doubling. Point addition and point doubling operations consist of many modular multiplications of large operands (256 bits for example), especially in projective and Jacobia...

Full description

Bibliographic Details
Published in:Cryptography
Main Author: Yamin Li
Format: Article
Language:English
Published: MDPI AG 2023-11-01
Subjects:
Online Access:https://www.mdpi.com/2410-387X/7/4/57