On Elliptic Curve Cryptography implementations and evaluation

被引:0
|
作者
Alimi, Nejmeddine [1 ,3 ]
Lahbib, Younes [2 ,3 ]
Machhout, Mohsen [3 ]
Tourki, Rached [3 ]
机构
[1] Univ Tunis El Manar, Fac Sci Tunis, El Manar Tunis 2092, Tunisia
[2] Univ Carthage, Natl Engn Sch Carthage, Charguia Ii Tunis 2035, Tunisia
[3] Univ Monastir, Elect & Microelect Lab, Monastir 5000, Tunisia
关键词
Elliptic Curve Cryptography; software; hardware; ASIC; FPGA; evaluation; performance; POINT MULTIPLICATION; ARCHITECTURE; SPEED; POWER; ECC;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Elliptic Curve Cryptography have known, in recent years, an increasing success in security applications thanks to their advantages such as a short keys size with a high security level. Their popularity has led to various implementations in terms of algorithms, curves, coordinate systems, platforms, etc. The aim of this work is first to explore actual trends of ECC-based implementations in different platforms through a review of a number of works. Secondly, to identify and gather the criteria and corresponding metrics used to evaluate the performance of these implementations. We also propose a platform for design exploration and evaluation of ECC designs.
引用
收藏
页码:35 / 40
页数:6
相关论文
共 50 条
  • [31] Analysis of Elliptic Curve Cryptography & RSA
    Khan, Mohammad Rafeek
    Upreti, Kamal
    Alam, Mohammad Imran
    Khan, Haneef
    Siddiqui, Shams Tabrez
    Haque, Mustafizul
    Parashar, Jyoti
    [J]. Journal of ICT Standardization, 2023, 11 (04): : 355 - 378
  • [32] A New Approach to Elliptic Curve Cryptography
    Singh, L. Dolendro
    Debbarma, Tribid
    [J]. 2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 78 - 82
  • [33] PARTIAL SIGNCRYPTION ELLIPTIC CURVE CRYPTOGRAPHY
    Elkamchouchi, Hassan M.
    Elhamshary, Amira S.
    [J]. 2011 3RD INTERNATIONAL CONFERENCE ON COMPUTER TECHNOLOGY AND DEVELOPMENT (ICCTD 2011), VOL 3, 2012, : 641 - 647
  • [34] Elliptic Curve Lightweight Cryptography: A Survey
    Andres Lara-Nino, Carlos
    Diaz-Perez, Arturo
    Morales-Sandoval, Miguel
    [J]. IEEE ACCESS, 2018, 6 : 72514 - 72550
  • [35] Elliptic curve cryptography on constraint environments
    de Santos, MD
    Sanchez-Avila, C
    Sanchez-Reillo, R
    [J]. 38TH ANNUAL 2004 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2004, : 212 - 220
  • [36] Elliptic Curve Cryptography: A Dynamic Paradigm
    Som, Subhranil
    Majumder, Rana
    Dutta, Sandip
    [J]. 2017 INTERNATIONAL CONFERENCE ON INFOCOM TECHNOLOGIES AND UNMANNED SYSTEMS (TRENDS AND FUTURE DIRECTIONS) (ICTUS), 2017, : 427 - 431
  • [37] Compiler assisted elliptic curve cryptography
    Barbosa, M.
    Moss, A.
    Page, D.
    [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2007: COOPIS, DOA, ODBASE, GADA, AND IS, PT 2, PROCEEDINGS, 2007, 4804 : 1785 - +
  • [38] A software library for elliptic curve cryptography
    Konstantinou, E
    Stamatiou, Y
    Zaroliagis, C
    [J]. ALGORITHMS-ESA 2002, PROCEEDINGS, 2002, 2461 : 625 - 636
  • [39] A reconfiguration hierarchy for elliptic curve cryptography
    Schaumont, P
    Verbauwhede, I
    [J]. CONFERENCE RECORD OF THE THIRTY-FIFTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, VOLS 1 AND 2, 2001, : 449 - 453
  • [40] Optimal Implementation of Elliptic Curve Cryptography
    Lv, Hongqiang
    Li, Hui
    Yi, Junkai
    Lu, Hao
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS (SOLI), 2013, : 35 - 39