Log in to save to my catalogue

A Review of Techniques for Implementing Elliptic Curve Point Multiplication on Hardware

A Review of Techniques for Implementing Elliptic Curve Point Multiplication on Hardware

https://devfeature-collection.sl.nsw.gov.au/record/TN_cdi_doaj_primary_oai_doaj_org_article_0a7b85c55cda481ab929d47bed9ea9b8

A Review of Techniques for Implementing Elliptic Curve Point Multiplication on Hardware

About this item

Full title

A Review of Techniques for Implementing Elliptic Curve Point Multiplication on Hardware

Publisher

Basel: MDPI AG

Journal title

Journal of sensor and actuator networks, 2021-03, Vol.10 (1), p.3

Language

English

Formats

Publication information

Publisher

Basel: MDPI AG

More information

Scope and Contents

Contents

Cryptography is considered indispensable among security measures applied to data concerning insecure means of transmission. Among various existent algorithms on asymmetric cryptography, we may cite Elliptic Curve Cryptography (ECC), which has been widely used due to its security level and reduced key sizes. When compared to Rivest, Shamir and Adlem...

Alternative Titles

Full title

A Review of Techniques for Implementing Elliptic Curve Point Multiplication on Hardware

Identifiers

Primary Identifiers

Record Identifier

TN_cdi_doaj_primary_oai_doaj_org_article_0a7b85c55cda481ab929d47bed9ea9b8

Permalink

https://devfeature-collection.sl.nsw.gov.au/record/TN_cdi_doaj_primary_oai_doaj_org_article_0a7b85c55cda481ab929d47bed9ea9b8

Other Identifiers

ISSN

2224-2708

E-ISSN

2224-2708

DOI

10.3390/jsan10010003

How to access this item