Hardware Implementations of Elliptic Curve Cryptography Using Shift-Sub Based Modular Multiplication Algorithms
Elliptic curve cryptography (ECC) over prime fields relies on scalar point multiplication realized by point addition and point doubling. Point addition and point doubling operations consist of many modular multiplications of large operands (256 bits for example), especially in projective and Jacobia...
| Published in: | Cryptography |
|---|---|
| Main Author: | Yamin Li |
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2023-11-01
|
| Subjects: | |
| Online Access: | https://www.mdpi.com/2410-387X/7/4/57 |
Similar Items
Area–Time-Efficient High-Radix Modular Inversion Algorithm and Hardware Implementation for ECC over Prime Fields
by: Yamin Li
Published: (2024-10-01)
by: Yamin Li
Published: (2024-10-01)
Area-Time Efficient Hardware Implementation of Modular Multiplication for Elliptic Curve Cryptography
by: MD. Mainul Islam, et al.
Published: (2020-01-01)
by: MD. Mainul Islam, et al.
Published: (2020-01-01)
Elliptic-Curve Crypto Processor for RFID Applications
by: Muhammad Rashid, et al.
Published: (2021-07-01)
by: Muhammad Rashid, et al.
Published: (2021-07-01)
An Optimized Flexible Accelerator for Elliptic Curve Point Multiplication over NIST Binary Fields
by: Amer Aljaedi, et al.
Published: (2023-09-01)
by: Amer Aljaedi, et al.
Published: (2023-09-01)
Large Field-Size Elliptic Curve Processor for Area-Constrained Applications
by: Muhammad Rashid, et al.
Published: (2023-01-01)
by: Muhammad Rashid, et al.
Published: (2023-01-01)
FPGA Implementation of Elliptic-Curve Point Multiplication Over GF(2<sup>233</sup>) Using Booth Polynomial Multiplier for Area-Sensitive Applications
by: Amer Aljaedi, et al.
Published: (2024-01-01)
by: Amer Aljaedi, et al.
Published: (2024-01-01)
Methods for using elliptic curves in cryptography
by: Obukhov Vadim, et al.
Published: (2024-01-01)
by: Obukhov Vadim, et al.
Published: (2024-01-01)
Lightweight Elliptic Curve Cryptography Accelerator Over 25519 Curves
by: Piljoo Choi, et al.
Published: (2025-01-01)
by: Piljoo Choi, et al.
Published: (2025-01-01)
Automated Correctness Proof of Algorithm Variants in Elliptic Curve Cryptography
by: M. . Anikeev, et al.
Published: (2010-12-01)
by: M. . Anikeev, et al.
Published: (2010-12-01)
Multi-Functional Resource-Constrained Elliptic Curve Cryptographic Processor
by: Binh Kieu Do-Nguyen, et al.
Published: (2023-01-01)
by: Binh Kieu Do-Nguyen, et al.
Published: (2023-01-01)
DCryp-Unit: Crypto Hardware Accelerator Unit Design for Elliptic Curve Point Multiplication
by: Adel R. Alharbi, et al.
Published: (2024-01-01)
by: Adel R. Alharbi, et al.
Published: (2024-01-01)
EC-Crypto: Highly Efficient Area-Delay Optimized Elliptic Curve Cryptography Processor
by: Khalid Javeed, et al.
Published: (2023-01-01)
by: Khalid Javeed, et al.
Published: (2023-01-01)
Elliptic Curve Cryptography with Machine Learning
by: Jihane Jebrane, et al.
Published: (2024-12-01)
by: Jihane Jebrane, et al.
Published: (2024-12-01)
Speeding-Up Elliptic Curve Cryptography Algorithms
by: Diana Maimuţ, et al.
Published: (2022-10-01)
by: Diana Maimuţ, et al.
Published: (2022-10-01)
A Hardware Descriptive Approach to Beetle Antennae Search
by: Zongcheng Yue, et al.
Published: (2020-01-01)
by: Zongcheng Yue, et al.
Published: (2020-01-01)
Faster Point Scalar Multiplication on Short Weierstrass Elliptic Curves over Fp using Twisted Hessian Curves over Fp2
by: Michał Wroń
Published: (2016-09-01)
by: Michał Wroń
Published: (2016-09-01)
A Compact 3-Stage Pipelined Hardware Accelerator for Point Multiplication of Binary Elliptic Curves Over GF(2<sup>233</sup>)
by: Mohammad Mazyad Hazzazi, et al.
Published: (2024-01-01)
by: Mohammad Mazyad Hazzazi, et al.
Published: (2024-01-01)
Elliptic curve cryptography and biometrics for iot authentication
by: Dargaoui Souhayla, et al.
Published: (2025-01-01)
by: Dargaoui Souhayla, et al.
Published: (2025-01-01)
IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY
by: Md Nizam Udin, et al.
Published: (2021-05-01)
by: Md Nizam Udin, et al.
Published: (2021-05-01)
An Integrated Image Encryption Scheme Based on Elliptic Curve
by: Ijaz Khalid, et al.
Published: (2023-01-01)
by: Ijaz Khalid, et al.
Published: (2023-01-01)
An Enhancement of the Elliptic Curve Cryptography by Using the PairingFunction
by: Sarah Hatem Namous, et al.
Published: (2025-07-01)
by: Sarah Hatem Namous, et al.
Published: (2025-07-01)
Evaluation of Computational Approaches of Short Weierstrass Elliptic Curves for Cryptography
by: Abhishek Kunal, et al.
Published: (2021-12-01)
by: Abhishek Kunal, et al.
Published: (2021-12-01)
Design and Validation of Low-Power Secure and Dependable Elliptic Curve Cryptosystem
by: Bikash Poudel, et al.
Published: (2021-11-01)
by: Bikash Poudel, et al.
Published: (2021-11-01)
An anonymous authentication protocol for vehicle to grid based on elliptic curve cryptography
by: Zeyu Sun, et al.
Published: (2025-08-01)
by: Zeyu Sun, et al.
Published: (2025-08-01)
Innovative Dual-Binary-Field Architecture for Point Multiplication of Elliptic Curve Cryptography
by: Jiakun Li, et al.
Published: (2021-01-01)
by: Jiakun Li, et al.
Published: (2021-01-01)
A network security protection scheme for tax system based on elliptic curve cryptography
by: Wenjie Wang, et al.
Published: (2024-12-01)
by: Wenjie Wang, et al.
Published: (2024-12-01)
Key Generation in Cryptography Using Elliptic-Curve Cryptography and Genetic Algorithm
by: Sanjay Kumar, et al.
Published: (2023-12-01)
by: Sanjay Kumar, et al.
Published: (2023-12-01)
Large Field-Size Throughput/Area Accelerator for Elliptic-Curve Point Multiplication on FPGA
by: Ahmed Alhomoud, et al.
Published: (2023-01-01)
by: Ahmed Alhomoud, et al.
Published: (2023-01-01)
Design of an Elliptic Curve Cryptography Processor for RFID Tag Chips
by: Zilong Liu, et al.
Published: (2014-09-01)
by: Zilong Liu, et al.
Published: (2014-09-01)
Cellular automata based key distribution for lightweight hybrid image encryption with elliptic curve cryptography
by: Biswarup Yogi, et al.
Published: (2025-10-01)
by: Biswarup Yogi, et al.
Published: (2025-10-01)
Families of elliptic curves with rational 3-torsion
by: Moody Dustin, et al.
Published: (2012-02-01)
by: Moody Dustin, et al.
Published: (2012-02-01)
Digital Content Security by Butterfly and Elliptic Curve Cryptography with Channel Optimization
by: Kartikey Pandey, et al.
Published: (2025-02-01)
by: Kartikey Pandey, et al.
Published: (2025-02-01)
Lookup Table-Based Design of Scalar Multiplication for Elliptic Curve Cryptography
by: Yan-Duan Ning, et al.
Published: (2024-03-01)
by: Yan-Duan Ning, et al.
Published: (2024-03-01)
On the Application of Noiseless Steganography and Elliptic Curves Cryptography Digital Signature Algorithm Methods in Securing Text Messages
by: Juhari Juhari, et al.
Published: (2022-10-01)
by: Juhari Juhari, et al.
Published: (2022-10-01)
Research and design of parallel architecture processor for elliptic curve cryptography
by: YANG Xiao-hui, et al.
Published: (2011-01-01)
by: YANG Xiao-hui, et al.
Published: (2011-01-01)
Research and design of parallel architecture processor for elliptic curve cryptography
by: YANG Xiao-hui, et al.
Published: (2011-01-01)
by: YANG Xiao-hui, et al.
Published: (2011-01-01)
Efficient ECC Processor Designs for IoT Using Edwards Curves and Exploiting FPGA Embedded Components
by: Osama Al-Khaleel, et al.
Published: (2024-01-01)
by: Osama Al-Khaleel, et al.
Published: (2024-01-01)
RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
by: Wumei ZHANG
Published: (2016-05-01)
by: Wumei ZHANG
Published: (2016-05-01)
RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
by: Wumei ZHANG
Published: (2016-05-01)
by: Wumei ZHANG
Published: (2016-05-01)
An anonymous SIP authenticated key agreement protocol based on elliptic curve cryptography
by: Yanrong Lu, et al.
Published: (2022-01-01)
by: Yanrong Lu, et al.
Published: (2022-01-01)
Similar Items
-
Area–Time-Efficient High-Radix Modular Inversion Algorithm and Hardware Implementation for ECC over Prime Fields
by: Yamin Li
Published: (2024-10-01) -
Area-Time Efficient Hardware Implementation of Modular Multiplication for Elliptic Curve Cryptography
by: MD. Mainul Islam, et al.
Published: (2020-01-01) -
Elliptic-Curve Crypto Processor for RFID Applications
by: Muhammad Rashid, et al.
Published: (2021-07-01) -
An Optimized Flexible Accelerator for Elliptic Curve Point Multiplication over NIST Binary Fields
by: Amer Aljaedi, et al.
Published: (2023-09-01) -
Large Field-Size Elliptic Curve Processor for Area-Constrained Applications
by: Muhammad Rashid, et al.
Published: (2023-01-01)
