With the rapid development of cloud computing technology and Internet of Things technology, user-sensitive data shows explosive growth. In order to ensure the security of user privacy data in the network, the state has successively issued a series of laws and regulations with the "Cryptography Law" as the core, which defines the standard requirements of cryptography application. Whether it is the service side represented by cloud computing or the terminal side represented by the Internet of Things, complex public-key cryptography computing power is facing great challenges. Public key cryptography algorithm is one of the core algorithms of cryptography, which is widely used in digital signature, key exchange, public key encryption and other cryptographic primitives. In 1987, ECCCElliptic Curve Cryptography) algorithm based on elliptic curve discrete logarithm problem first came into the view of researchers. Compared with the traditional RSA algorithm, the elliptic curve algorithm has a shorter key length and has important advantages in computing speed, resource storage, data bandwidth, etc. It can be used to realize key exchange, digital signature, public-key encryption, and other cryptographic primitives. It is one of the most widely used public-key cryptography technologies. How to implement elliptic curve public key cryptosystem with high computational complexity safely and efficiently has always been a challenging topic for cryptographers. With the growing demand for application cryptography, the research on the implementation of high-performance elliptic curve public key cryptography algorithms presents a new development trend, but also brings about corresponding problems. In the cloud computing scenario, the server hardware itself has the characteristics of high performance computing capacity, large memory, etc. In the scenario of the Internet of Things, due to the massive deployment of terminal equipment, the hardware cost is limited, and the ROM space resources of a large number of low-end processor devices are seriously insufficient. However, a large number of application scenarios (such as intelligent transportation, intelligent medical treatment, etc.) have strict requirements on the delay of cryptographic algorithms. On the server side, the main requirements of cloud computing oriented elliptic curve cryptography algorithm computing technology are: high throughput, low latency, and high security; On the terminal side, the requirements of the elliptic curve cryptography algorithm for the Internet of Things are: lightweight, high-performance, and high security. Due to the differences between hardware platforms and requirements, they must be studied separately to ensure that both sides of the end cloud can meet the current development trend of the Internet of Everything. This article briefly analyzes two different application scenarios on the server side and the terminal side and clarifies the huge differences in software and hardware and cryptographic algorithm requirements on both sides of the terminal and cloud. Furthermore, the standards of various elliptic curve cryptography algorithms and the parameters of the hardware development platform are summarized. Based on the above content, this paper summarizes the efficient software implementation technology of elliptic curve cryptography, mainly introduces the research status of domestic elliptic curve cryptography, and looks forward to the future development trend of elliptic curve cryptography algorithm implementation. © 2023 Science Press. All rights reserved.