Implementation of an Elliptic Curve Based Message Authentication Code for Constrained Environments

3Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper presents the hardware implementation of a new method for message authentication based on elliptic curves. The proposed method makes use of the elliptic curve point multiplication unit already available in the system as a part of key exchange. The point multiplication unit is time shared for generating the authentication code resulting in reduced hardware complexity. Hence it is suitable for applications with limited resources like wireless sensor networks and smart grid. The security of the proposed MAC is vested in Elliptic Curve Discrete Logarithm Problem(ECDLP). © Springer-Verlag Berlin Heidelberg 2014.

Cite

CITATION STYLE

APA

Jilna, P., & Deepthi, P. P. (2014). Implementation of an Elliptic Curve Based Message Authentication Code for Constrained Environments. In Communications in Computer and Information Science (Vol. 420 CCIS, pp. 520–529). Springer Verlag. https://doi.org/10.1007/978-3-642-54525-2_46

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free