Review of Elliptic Curve Cryptography processor designs

43Citations
Citations of this article
33Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Elliptic Curve Cryptography (ECC) is a multilayer system with increased hardware implementation complexity. A wide range of parameters and design choices affect the overall implementation of ECC systems. A variety of hardware implementations of ECC system that vary in parameters are proposed in the literature. Implementation target, underlying finite fields, coordinate system and modular arithmetic algorithms are key design elements that impact the overall implementation outcome. In this paper, we survey the various implementation approaches with the aim of providing a useful reference for hardware designers for building efficient ECC processors. Our literature review consists of four components. First, we list the design options and discuss their impact on ECC implementation. Second, we summarize different approaches and algorithms used in the literature for implementing modular arithmetic operations. Third, we review best practices in the literature for data paths and overall architectures. Fourth, we review the existing parallelism and performance enhancement techniques. In addition, this paper provides comparison of the different binary extension, prime and dual 8 hardware implementations of ECC.

Cite

CITATION STYLE

APA

Marzouqi, H., Al-Qutayri, M., & Salah, K. (2015). Review of Elliptic Curve Cryptography processor designs. Microprocessors and Microsystems, 39(2), 97–112. https://doi.org/10.1016/j.micpro.2015.02.003

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free