A Review of Techniques for Implementing Elliptic Curve Point Multiplication on Hardware
Cryptography is considered indispensable among security measures applied to data concerning insecure means of transmission. Among various existent algorithms on asymmetric cryptography, we may cite Elliptic Curve Cryptography (ECC), which has been widely used due to its security level and reduced ke...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2020-12-01
|
Series: | Journal of Sensor and Actuator Networks |
Subjects: | |
Online Access: | https://www.mdpi.com/2224-2708/10/1/3 |