Implementation of Generic and Efficient Architecture of Elliptic Curve Cryptography over Various GF(p) for Higher Data Security
Abstract
Full Text:
PDFReferences
V.S. Miller, “Use of elliptic curves in cryptography”, Advances in Cryptology CRYPTO 85 Proceedings, Lecture Notes in Computer Science, Springer, Berlin Heidelberg, vol. 218, pp. 417–426, 1986.
H. Marzouqi, M. Al-Qutayri, and K. Salah, “Review of Elliptic Curve Cryptography processor designs,” Elsevier Microprocess. Microsyst., vol. 39, no. 2, pp. 97–112, 2015.
C. Lee and H. Chien, “An Elliptic Curve Cryptography-Based RFID Authentication Securing E-Health System,” International Journal of Distributed Sensor Networks, doi:10.1155/2015/642425, Dec. 2015.
D. Hankerson, J.C. Lopez Hernandez and A.J. Menezes “Software implementation of Elliptic Curve Cryptography over binary fields”. In Cryptographic Hardware and Embedded Systems, CHES vol. 2, pp. 1-24, 2000.
M. Bluhm and S. Gueron, “ Fast software implementation of binary elliptic curve cryptography”, Springer, Journal of Cryptographic Engineering, vol. 5, pp. 215–226, 2015.
C. A. Lara-Nino, A. Diaz-Perez, and M. Morales-Sandoval, “Elliptic Curve Lightweight Cryptography: A Survey,” IEEE Access, vol. 6, pp. 514–550, 2018, doi: 10.1109/ACCESS.2018.2881444.
Y. Chen and C. Huang, “Efficient Operations In Large Finite Fields For Elliptic Curve Cryptographic” International Journal of Engineering Technologies and Management Research, vol 7, no.6, pp. 141–151, June 2020.
S. S. Dhanda, B. Singh, and P. Jindal, “Demystifying elliptic curve cryptography: Curve selection, implementation and countermeasures to attacks,” J. Interdiscip. Math., vol. 23, no. 2, pp. 463–470, 2020.
L. D. Singh and K. M. Singh, “Implementation of Text Encryption using Elliptic Curve Cryptography,” Procedia Comput. Sci., vol. 54, pp. 73–82, 2015.
S. Nagaraj, G. S. V. P. Raju, and K. Koteswara Rao, “Image encryption using elliptic curve cryptography and matrix,” Procedia Comput. Sci., vol. 48, pp. 276–281, 2015.
T. Kudithi and R. Sakthivel, “An efficient hardware implementation of the elliptic curve cryptographic processor over prime field, Fp,” Int. J. Circuit Theory Appl., vol. 48, pp. 1256–1273, 2020, doi: 10.1002/cta.2759.
M. M. Islam, M. S. Hossain, M. D. Shahjalal, M. K. Hasan, and Y. M. Jang, “Area-Time Efficient Hardware Implementation of Modular Multiplication for Elliptic Curve Cryptography,” IEEE Access, vol. 8, pp. 73898–73906, 2020, doi: 10.1109/ACCESS.2020.2988379.
M. M. Islam, M. S. Hossain, M. K. Hasan, M. Shahjalal, and Y. M. Jang, “FPGA Implementation of High-Speed Area-Efficient Processor for Elliptic Curve Point Multiplication over Prime Field,” IEEE Access, vol. 7, pp. 178811–178826, 2019, doi: 10.1109/ACCESS.2019.2958491.
C. A. Lara-Nino, A. Diaz-Perez, and M. Morales-Sandoval, “Lightweight elliptic curve cryptography accelerator for internet of things applications,” Ad Hoc Networks, vol. 103, pp. 102159, 2020, doi: 10.1016/j.adhoc.2020.102159.
S. Asif, M. Hossain, and Y. Kong, “High-throughput multi-key elliptic curve cryptosystem based on residue number system,” IET Computers and Digital Techniques, vol. 11, no. 5, pp. 165–172, 2017.
S. Gueron and V. Krasnov, “Fast prime field elliptic-curve cryptography with 256-bit primes,” J. Cryptograph. Eng., vol. 5, no. 2, pp. 141–151, 2014.
J.Y. Lai, C.T. Huang,”Energy-adaptive dual-field processor for high performance elliptic curve cryptographic applications “, IEEE Trans. Very Large Scale Integr. VLSI Syst., vol.19 (8), pp. 1512–1517, 2011.
I. Setiadi, A. I. Kistijantoro, and A. Miyaji, “Elliptic curve cryptography: Algorithms and implementation analysis over coordinate systems,” ICAICT Int. Conf. Adv. Informatics Concepts, Theory Appl., Nov. 2015, doi: 10.1109/ICAICTA.2015.7335349.
N. Koblitz, “Elliptic curve cryptosystems - Mathematics of Computation”, Math. Comp. vol 48, pp . 203-209, 1987.
Refbacks
- There are currently no refbacks.
------------------------------------------------------------------------------------------------------------------------
The ADBU Journal of Engineering Technology (AJET)" ISSN:2348-7305
This journal is published under the terms of the Creative Commons Attribution (CC-BY) (http://creativecommons.org/licenses/)