Hardware Implementations of Elliptic Curve Cryptography Using Shift-Sub Based Modular Multiplication Algorithms
Elliptic curve cryptography (ECC) over prime fields relies on scalar point multiplication realized by point addition and point doubling. Point addition and point doubling operations consist of many modular multiplications of large operands (256 bits for example), especially in projective and Jacobia...
| Published in: | Cryptography |
|---|---|
| Main Author: | |
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2023-11-01
|
| Subjects: | |
| Online Access: | https://www.mdpi.com/2410-387X/7/4/57 |
