Research and design of parallel architecture processor for elliptic curve cryptography
Based on the analysis of the ECC algorithms processing structure characteristics and parallel schedule on finite field level,a parallel architecture processor model for ECC was proposed which adopting the ILP and DLP.A prototype has been implemented based on the parallel architecture processor model...
| Published in: | Tongxin xuebao |
|---|---|
| Main Authors: | YANG Xiao-hui, DAI Zi-bin, LI Miao, ZHANG Yong-fu |
| Format: | Article |
| Language: | Chinese |
| Published: |
Editorial Department of Journal on Communications
2011-01-01
|
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/thesisDetails?columnId=74418281&Fpath=home&index=0 |
Similar Items
Research and design of parallel architecture processor for elliptic curve cryptography
by: YANG Xiao-hui, et al.
Published: (2011-01-01)
by: YANG Xiao-hui, et al.
Published: (2011-01-01)
Design of an Elliptic Curve Cryptography Processor for RFID Tag Chips
by: Zilong Liu, et al.
Published: (2014-09-01)
by: Zilong Liu, et al.
Published: (2014-09-01)
Multi-Functional Resource-Constrained Elliptic Curve Cryptographic Processor
by: Binh Kieu Do-Nguyen, et al.
Published: (2023-01-01)
by: Binh Kieu Do-Nguyen, et al.
Published: (2023-01-01)
Elliptic-Curve Crypto Processor for RFID Applications
by: Muhammad Rashid, et al.
Published: (2021-07-01)
by: Muhammad Rashid, et al.
Published: (2021-07-01)
Large Field-Size Elliptic Curve Processor for Area-Constrained Applications
by: Muhammad Rashid, et al.
Published: (2023-01-01)
by: Muhammad Rashid, et al.
Published: (2023-01-01)
Secure Elliptic Curve Crypto-Processor for Real-Time IoT Applications
by: Stefano Di Matteo, et al.
Published: (2021-08-01)
by: Stefano Di Matteo, et al.
Published: (2021-08-01)
Methods for using elliptic curves in cryptography
by: Obukhov Vadim, et al.
Published: (2024-01-01)
by: Obukhov Vadim, et al.
Published: (2024-01-01)
CrISA-X: Unleashing Performance Excellence in Lightweight Symmetric Cryptography for Extendable and Deeply Embedded Processors
by: Oren Ganon, et al.
Published: (2024-07-01)
by: Oren Ganon, et al.
Published: (2024-07-01)
Automated Correctness Proof of Algorithm Variants in Elliptic Curve Cryptography
by: M. . Anikeev, et al.
Published: (2010-12-01)
by: M. . Anikeev, et al.
Published: (2010-12-01)
Elliptic Curve Cryptography with Machine Learning
by: Jihane Jebrane, et al.
Published: (2024-12-01)
by: Jihane Jebrane, et al.
Published: (2024-12-01)
Speeding-Up Elliptic Curve Cryptography Algorithms
by: Diana Maimuţ, et al.
Published: (2022-10-01)
by: Diana Maimuţ, et al.
Published: (2022-10-01)
Fast Implementation of NIST P-256 Elliptic Curve Cryptography on 8-Bit AVR Processor
by: Dong-won Park, et al.
Published: (2020-12-01)
by: Dong-won Park, et al.
Published: (2020-12-01)
ACryp-Proc: Flexible Asymmetric Crypto Processor for Point Multiplication
by: Malik Imran, et al.
Published: (2018-01-01)
by: Malik Imran, et al.
Published: (2018-01-01)
Elliptic curve cryptography and biometrics for iot authentication
by: Dargaoui Souhayla, et al.
Published: (2025-01-01)
by: Dargaoui Souhayla, et al.
Published: (2025-01-01)
IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY
by: Md Nizam Udin, et al.
Published: (2021-05-01)
by: Md Nizam Udin, et al.
Published: (2021-05-01)
An Enhancement of the Elliptic Curve Cryptography by Using the PairingFunction
by: Sarah Hatem Namous, et al.
Published: (2025-07-01)
by: Sarah Hatem Namous, et al.
Published: (2025-07-01)
Evaluation of Computational Approaches of Short Weierstrass Elliptic Curves for Cryptography
by: Abhishek Kunal, et al.
Published: (2021-12-01)
by: Abhishek Kunal, et al.
Published: (2021-12-01)
Area-Time Efficient Hardware Implementation of Modular Multiplication for Elliptic Curve Cryptography
by: MD. Mainul Islam, et al.
Published: (2020-01-01)
by: MD. Mainul Islam, et al.
Published: (2020-01-01)
An anonymous authentication protocol for vehicle to grid based on elliptic curve cryptography
by: Zeyu Sun, et al.
Published: (2025-08-01)
by: Zeyu Sun, et al.
Published: (2025-08-01)
A network security protection scheme for tax system based on elliptic curve cryptography
by: Wenjie Wang, et al.
Published: (2024-12-01)
by: Wenjie Wang, et al.
Published: (2024-12-01)
Key Generation in Cryptography Using Elliptic-Curve Cryptography and Genetic Algorithm
by: Sanjay Kumar, et al.
Published: (2023-12-01)
by: Sanjay Kumar, et al.
Published: (2023-12-01)
Cellular automata based key distribution for lightweight hybrid image encryption with elliptic curve cryptography
by: Biswarup Yogi, et al.
Published: (2025-10-01)
by: Biswarup Yogi, et al.
Published: (2025-10-01)
Lightweight Elliptic Curve Cryptography Accelerator Over 25519 Curves
by: Piljoo Choi, et al.
Published: (2025-01-01)
by: Piljoo Choi, et al.
Published: (2025-01-01)
Families of elliptic curves with rational 3-torsion
by: Moody Dustin, et al.
Published: (2012-02-01)
by: Moody Dustin, et al.
Published: (2012-02-01)
A Programmable Crypto-Processor for National Institute of Standards and Technology Post-Quantum Cryptography Standardization Based on the RISC-V Architecture
by: Jihye Lee, et al.
Published: (2023-11-01)
by: Jihye Lee, et al.
Published: (2023-11-01)
Digital Content Security by Butterfly and Elliptic Curve Cryptography with Channel Optimization
by: Kartikey Pandey, et al.
Published: (2025-02-01)
by: Kartikey Pandey, et al.
Published: (2025-02-01)
Lookup Table-Based Design of Scalar Multiplication for Elliptic Curve Cryptography
by: Yan-Duan Ning, et al.
Published: (2024-03-01)
by: Yan-Duan Ning, et al.
Published: (2024-03-01)
On the Application of Noiseless Steganography and Elliptic Curves Cryptography Digital Signature Algorithm Methods in Securing Text Messages
by: Juhari Juhari, et al.
Published: (2022-10-01)
by: Juhari Juhari, et al.
Published: (2022-10-01)
EC-Crypto: Highly Efficient Area-Delay Optimized Elliptic Curve Cryptography Processor
by: Khalid Javeed, et al.
Published: (2023-01-01)
by: Khalid Javeed, et al.
Published: (2023-01-01)
RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
by: Wumei ZHANG
Published: (2016-05-01)
by: Wumei ZHANG
Published: (2016-05-01)
RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
by: Wumei ZHANG
Published: (2016-05-01)
by: Wumei ZHANG
Published: (2016-05-01)
An anonymous SIP authenticated key agreement protocol based on elliptic curve cryptography
by: Yanrong Lu, et al.
Published: (2022-01-01)
by: Yanrong Lu, et al.
Published: (2022-01-01)
Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
by: Younsung Choi, et al.
Published: (2014-06-01)
by: Younsung Choi, et al.
Published: (2014-06-01)
An Offline Direct Authentication Scheme for the Internet of Medical Things Based on Elliptic Curve Cryptography
by: Asmaa Maarouf, et al.
Published: (2024-01-01)
by: Asmaa Maarouf, et al.
Published: (2024-01-01)
A Novel Asymmetric Hyperchaotic Image Encryption Scheme Based on Elliptic Curve Cryptography
by: Haotian Liang, et al.
Published: (2021-06-01)
by: Haotian Liang, et al.
Published: (2021-06-01)
ELLIPTIC-CURVE CRYPTOGRAPHY (ECC) AND ARGON2 ALGORITHM IN PHP USING OPENSSL AND SODIUM LIBRARIES
by: Mariusz Duka
Published: (2020-09-01)
by: Mariusz Duka
Published: (2020-09-01)
Lightweight Authentication Mechanism for Industrial IoT Environment Combining Elliptic Curve Cryptography and Trusted Token
by: Yu-Sheng Yang, et al.
Published: (2023-05-01)
by: Yu-Sheng Yang, et al.
Published: (2023-05-01)
Integrating Elliptic Curve Cryptography with the Modbus TCP SCADA Communication Protocol
by: Despoina Chochtoula, et al.
Published: (2022-07-01)
by: Despoina Chochtoula, et al.
Published: (2022-07-01)
Compilation Techniques Specific for a Hardware Cryptography-Embedded Multimedia Mobile Processor
by: Masa-aki FUKASE, et al.
Published: (2007-12-01)
by: Masa-aki FUKASE, et al.
Published: (2007-12-01)
On hashing into elliptic curves
by: Farashahi Reza R., et al.
Published: (2009-12-01)
by: Farashahi Reza R., et al.
Published: (2009-12-01)
Similar Items
-
Research and design of parallel architecture processor for elliptic curve cryptography
by: YANG Xiao-hui, et al.
Published: (2011-01-01) -
Design of an Elliptic Curve Cryptography Processor for RFID Tag Chips
by: Zilong Liu, et al.
Published: (2014-09-01) -
Multi-Functional Resource-Constrained Elliptic Curve Cryptographic Processor
by: Binh Kieu Do-Nguyen, et al.
Published: (2023-01-01) -
Elliptic-Curve Crypto Processor for RFID Applications
by: Muhammad Rashid, et al.
Published: (2021-07-01) -
Large Field-Size Elliptic Curve Processor for Area-Constrained Applications
by: Muhammad Rashid, et al.
Published: (2023-01-01)
