A modular design of elliptic-curve point multiplication for resource constrained devices
Elliptic curve cryptography (ECC) is a good candidate for protecting secret data on resource constrained devices. FPGA-based implementations of its main operation, i.e., scalar point multiplication, have gained popularity for their apparent speed advantage over the software counterparts. This paper...
Saved in:
Main Authors: | Wei, Wei, Zhang, Li, Chang, Chip-Hong |
---|---|
Other Authors: | School of Electrical and Electronic Engineering |
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2015
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/105040 http://hdl.handle.net/10220/25167 http://dx.doi.org/10.1109/ISICIR.2014.7029487 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
UDhashing : physical unclonable function-based user-device hash for endpoint authentication
by: Zheng, Yue, et al.
Published: (2021) -
VHDL synthesis of Montgomery modular multiplier
by: Sarasvathi Thangaraju.
Published: (2008) -
Obfuscation and watermarking of FPGA designs based on constant value generators
by: Sergeichik, Vladimir V., et al.
Published: (2015) -
Protecting FPGA design with elliptic curve cryptography
by: Wei, Wei
Published: (2014) -
Hardware-efficient systolic-like modular design for two-dimensional discrete wavelet transform
by: Meher, Pramod Kumar, et al.
Published: (2011)