A modular design of elliptic-curve point multiplication for resource constrained devices
Elliptic curve cryptography (ECC) is a good candidate for protecting secret data on resource constrained devices. FPGA-based implementations of its main operation, i.e., scalar point multiplication, have gained popularity for their apparent speed advantage over the software counterparts. This paper...
Saved in:
Main Authors: | Wei, Wei, Zhang, Li, Chang, Chip-Hong |
---|---|
Other Authors: | School of Electrical and Electronic Engineering |
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2015
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/105040 http://hdl.handle.net/10220/25167 http://dx.doi.org/10.1109/ISICIR.2014.7029487 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
UDhashing : physical unclonable function-based user-device hash for endpoint authentication
by: Zheng, Yue, et al.
Published: (2021) -
VHDL synthesis of Montgomery modular multiplier
by: Sarasvathi Thangaraju.
Published: (2008) -
Analysis of circuit aging on accuracy degradation of deep neural network accelerator
by: Liu, Wenye, et al.
Published: (2020) -
UVM based constrained random automated register verification of interface IP subsystem
by: Shanmuga Sundaram Santhosh Raju
Published: (2018) -
An efficient channel clustering and flow rate allocation algorithm for non-uniform microfluidic cooling of 3D integrated circuits
by: Qian, Hanhua, et al.
Published: (2012)