2 research outputs found
A survey of hardware implementations of elliptic curve cryptographic systems
Elliptic Curve Cryptography (ECC) has gained much recognition over the last decades and has established itself among the well known public-key cryptography schemes, not least due its smaller key size and relatively lower computational effort compared to RSA. The wide employment of Elliptic Curve Cryptography in many different application areas has been leading to a variety of implementation types and domains ranging from pure software approaches over hardware implemenations to hardware/software co-designs. The following review provides an overview of state of the art hardware implemenations of ECC, specifically in regard to their targeted design goals. In this context the suitability of the hardware/software approach in regard to the security challenges opposed by the low-end embedded devices of the Internet of Things is briefly examined. The paper also outlines ECC’s vulnerability against quantum attacks and references one possible solution to that problem
A Survey of Hardware Implementations of Elliptic Curve Cryptographic Systems
Elliptic Curve Cryptography (ECC) has gained
much recognition over the last decades and has established itself
among the well known public-key cryptography schemes, not
least due its smaller key size and relatively lower computational
effort compared to RSA. The wide employment of Elliptic Curve
Cryptography in many different application areas has been
leading to a variety of implementation types and domains ranging
from pure software approaches over hardware implementations
to hardware/software co-designs. The following review provides
an overview of state of the art hardware implementations of ECC,
specifically in regard to their targeted design goals. In this context
the suitability of the hardware/software approach in regard to the
security challenges opposed by the low-end embedded devices of
the Internet of Things is briefly examined. The paper also outlines
ECC’s vulnerability against quantum attacks and references one
possible solution to that problem