A Review of Techniques for Implementing Elliptic Curve Point Multiplication on Hardware
A Review of Techniques for Implementing Elliptic Curve Point Multiplication on Hardware
About this item
Full title
Author / Creator
Publisher
Basel: MDPI AG
Journal title
Language
English
Formats
Publication information
Publisher
Basel: MDPI AG
Subjects
More information
Scope and Contents
Contents
Cryptography is considered indispensable among security measures applied to data concerning insecure means of transmission. Among various existent algorithms on asymmetric cryptography, we may cite Elliptic Curve Cryptography (ECC), which has been widely used due to its security level and reduced key sizes. When compared to Rivest, Shamir and Adlem...
Alternative Titles
Full title
A Review of Techniques for Implementing Elliptic Curve Point Multiplication on Hardware
Authors, Artists and Contributors
Identifiers
Primary Identifiers
Record Identifier
TN_cdi_doaj_primary_oai_doaj_org_article_0a7b85c55cda481ab929d47bed9ea9b8
Permalink
https://devfeature-collection.sl.nsw.gov.au/record/TN_cdi_doaj_primary_oai_doaj_org_article_0a7b85c55cda481ab929d47bed9ea9b8
Other Identifiers
ISSN
2224-2708
E-ISSN
2224-2708
DOI
10.3390/jsan10010003