A new approach to elliptic curve cryptography: An RNS architecture

被引:25
|
作者
Schinianakis, D. M. [1 ]
Kakarountas, A. P. [1 ]
Stouraitis, T. [1 ]
机构
[1] Univ Patras, Dept Elect & Comp Engn, Patras, Greece
关键词
D O I
10.1109/MELCON.2006.1653327
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
An Elliptic Curve Point Multiplier (ECPM) is the main part of all Elliptic Curve Cryptography (ECC) systems and its performance is decisive for the performance of the overall cryptosystem. A VLSI Residue Number System (RNS) architecture of an ECPM is presented in this paper. In the proposed approach, the necessary mathematical conditions that need to be satisfied, in order to replace typical finite field circuits with RNS ones, are investigated. It is shown that such an application is feasible and that it leads to a significant improvement in the execution time of a scalar point multiplication.
引用
收藏
页码:1241 / 1245
页数:5
相关论文
共 50 条
  • [21] A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY
    Aydin, M. Ali
    Aydin, G. Zeynep
    ISTANBUL UNIVERSITY-JOURNAL OF ELECTRICAL AND ELECTRONICS ENGINEERING, 2006, 6 (02): : 211 - 221
  • [22] A survey of elliptic curve cryptography
    Istanbul University, Engineering Faculty, Computer Engineering Dept., 34320 Avcilar, Istanbul, Turkey
    Istanb. Univ. J. Electr. Electron. Eng., 2006, 2 (211-221):
  • [23] Research on elliptic curve cryptography
    Qiu, QZ
    Xiong, QX
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOL 2, 2004, : 698 - 701
  • [24] Investigation into the Elliptic Curve Cryptography
    Fang, Xianjin
    Wu, Yanting
    2017 3RD INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM 2017), 2017, : 412 - 415
  • [25] Elliptic curve cryptography engineering
    Cilardo, A
    Coppolino, L
    Mazzocca, N
    Romano, L
    PROCEEDINGS OF THE IEEE, 2006, 94 (02) : 395 - 406
  • [26] Novel Approach Design of Elliptic curve Cryptography Implementation in VLSI
    Chandrasekaran, V.
    Nagarajan, N.
    RECENT ADVANCES IN NETWORKING, VLSI AND SIGNAL PROCESSING, 2010, : 99 - +
  • [27] An end-to-end systems approach to elliptic curve cryptography
    Gura, N
    Shantz, SC
    Eberle, H
    Gupta, S
    Gupta, V
    Finchelstein, D
    Goupy, E
    Stebila, D
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2002, 2002, 2523 : 349 - 365
  • [28] Elliptic Curve Cryptography. A new-way for encryption
    Ali, Rahim
    2008 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, 2008, : 179 - 183
  • [29] A new dual-field Elliptic Curve Cryptography processor
    Wu, Yongyi
    Zeng, Xiaoyang
    2006 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-11, PROCEEDINGS, 2006, : 305 - +
  • [30] Efficient Algorithm and Architecture for Elliptic Curve Cryptography for Extremely Constrained Secure Applications
    Azarderakhsh, Reza
    Jarvinen, Kimmo U.
    Mozaffari-Kermani, Mehran
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2014, 61 (04) : 1144 - 1155