On Elliptic Curve Cryptography implementations and evaluation

被引:0
|
作者
Alimi, Nejmeddine [1 ,3 ]
Lahbib, Younes [2 ,3 ]
Machhout, Mohsen [3 ]
Tourki, Rached [3 ]
机构
[1] Univ Tunis El Manar, Fac Sci Tunis, El Manar Tunis 2092, Tunisia
[2] Univ Carthage, Natl Engn Sch Carthage, Charguia Ii Tunis 2035, Tunisia
[3] Univ Monastir, Elect & Microelect Lab, Monastir 5000, Tunisia
关键词
Elliptic Curve Cryptography; software; hardware; ASIC; FPGA; evaluation; performance; POINT MULTIPLICATION; ARCHITECTURE; SPEED; POWER; ECC;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Elliptic Curve Cryptography have known, in recent years, an increasing success in security applications thanks to their advantages such as a short keys size with a high security level. Their popularity has led to various implementations in terms of algorithms, curves, coordinate systems, platforms, etc. The aim of this work is first to explore actual trends of ECC-based implementations in different platforms through a review of a number of works. Secondly, to identify and gather the criteria and corresponding metrics used to evaluate the performance of these implementations. We also propose a platform for design exploration and evaluation of ECC designs.
引用
收藏
页码:35 / 40
页数:6
相关论文
共 50 条
  • [1] Studying software implementations of Elliptic Curve Cryptography
    Yan, Hai
    Shi, Zhijie Jerry
    [J]. THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, PROCEEDINGS, 2006, : 78 - +
  • [2] Effective Implementations of Scalar Multiplications in Elliptic Curve Cryptography
    Menandas, Josepha J.
    Christo, Mary Subaja
    [J]. 2024 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND APPLIED INFORMATICS, ACCAI 2024, 2024,
  • [3] ELLIPTIC CURVE CRYPTOGRAPHY. JAVA']JAVA PLATFORM IMPLEMENTATIONS
    Gayoso Martinez, V.
    Hernandez Encinas, L.
    Sanchez Avila, C.
    [J]. INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2009, 1 (04): : 65 - 72
  • [4] Efficient Hardware Implementations for Elliptic Curve Cryptography over Curve448
    Niasar, Mojtaba Bisheh
    Azarderakhsh, Reza
    Kermani, Mehran Mozaffari
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2020, 2020, 12578 : 228 - 247
  • [5] High-speed hardware implementations of Elliptic Curve Cryptography: A survey
    de Dormale, Guerric Meurice
    Quisquater, Jean-Jacques
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2007, 53 (2-3) : 72 - 84
  • [6] Performance Evaluation of RSA and Elliptic Curve Cryptography
    Singh, Soram Ranbir
    Khan, Ajoy Kumar
    Singh, Soram Rakesh
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2016, : 302 - 306
  • [7] A Flexible Soft IP Core for Standard Implementations of Elliptic Curve Cryptography in Hardware
    Ferreira, Bruno F.
    Calazans, Ney L. V.
    [J]. 2013 IEEE 20TH INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS, AND SYSTEMS (ICECS), 2013, : 577 - 580
  • [8] Cost-Effective Implementations of GF (p) Elliptic Curve Cryptography Computations
    Khali, Hakim
    Farah, Ahcene
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (08): : 29 - 37
  • [9] FPGA implementations of elliptic curve cryptography and Tate pairing over a binary field
    Li, Hao
    Huang, Jian
    Sweany, Philip
    Huang, Dijiang
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2008, 54 (12) : 1077 - 1088
  • [10] Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things
    Liu, Zhe
    Grossschadl, Johann
    Hu, Zhi
    Jarvinen, Kimmo
    Wang, Husen
    Verbauwhede, Ingrid
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2017, 66 (05) : 773 - 785