A new approach to elliptic curve cryptography: An RNS architecture

被引:25
|
作者
Schinianakis, D. M. [1 ]
Kakarountas, A. P. [1 ]
Stouraitis, T. [1 ]
机构
[1] Univ Patras, Dept Elect & Comp Engn, Patras, Greece
关键词
D O I
10.1109/MELCON.2006.1653327
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
An Elliptic Curve Point Multiplier (ECPM) is the main part of all Elliptic Curve Cryptography (ECC) systems and its performance is decisive for the performance of the overall cryptosystem. A VLSI Residue Number System (RNS) architecture of an ECPM is presented in this paper. In the proposed approach, the necessary mathematical conditions that need to be satisfied, in order to replace typical finite field circuits with RNS ones, are investigated. It is shown that such an application is feasible and that it leads to a significant improvement in the execution time of a scalar point multiplication.
引用
收藏
页码:1241 / 1245
页数:5
相关论文
共 50 条
  • [41] Elliptic Curve Lightweight Cryptography: A Survey
    Andres Lara-Nino, Carlos
    Diaz-Perez, Arturo
    Morales-Sandoval, Miguel
    IEEE ACCESS, 2018, 6 : 72514 - 72550
  • [42] Analysis of Elliptic Curve Cryptography & RSA
    Khan M.R.
    Upreti K.
    Alam M.I.
    Khan H.
    Siddiqui S.T.
    Haque M.
    Parashar J.
    Journal of ICT Standardization, 2023, 11 (04): : 355 - 378
  • [43] PARTIAL SIGNCRYPTION ELLIPTIC CURVE CRYPTOGRAPHY
    Elkamchouchi, Hassan M.
    Elhamshary, Amira S.
    2011 3RD INTERNATIONAL CONFERENCE ON COMPUTER TECHNOLOGY AND DEVELOPMENT (ICCTD 2011), VOL 3, 2012, : 641 - 647
  • [44] Elliptic curve cryptography on constraint environments
    de Santos, MD
    Sanchez-Avila, C
    Sanchez-Reillo, R
    38TH ANNUAL 2004 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2004, : 212 - 220
  • [45] A reconfiguration hierarchy for elliptic curve cryptography
    Schaumont, P
    Verbauwhede, I
    CONFERENCE RECORD OF THE THIRTY-FIFTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, VOLS 1 AND 2, 2001, : 449 - 453
  • [46] Optimal Implementation of Elliptic Curve Cryptography
    Lv, Hongqiang
    Li, Hui
    Yi, Junkai
    Lu, Hao
    2013 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS (SOLI), 2013, : 35 - 39
  • [47] A software library for elliptic curve cryptography
    Konstantinou, E
    Stamatiou, Y
    Zaroliagis, C
    ALGORITHMS-ESA 2002, PROCEEDINGS, 2002, 2461 : 625 - 636
  • [48] Low power elliptic curve cryptography
    Keller, Maurice
    Marnane, William
    INTEGRATED CIRCUIT AND SYSTEM DESIGN: POWER AND TIMING MODELING, OPTIMIZATION AND SIMULATION, 2007, 4644 : 310 - +
  • [49] Elliptic curve cryptography on smart cards
    de-Miguel-de-Santos, M
    Sanchez-Avila, C
    Sanchez-Reillo, R
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL V, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2004, : 162 - 167