A Review of Techniques for Implementing Elliptic Curve Point Multiplication on Hardware

Cryptography is considered indispensable among security measures applied to data concerning insecure means of transmission. Among various existent algorithms on asymmetric cryptography, we may cite Elliptic Curve Cryptography (ECC), which has been widely used due to its security level and reduced ke...

Full description

Bibliographic Details
Main Authors: Arielle Verri Lucca, Guilherme Augusto Mariano Sborz, Valderi Reis Quietinho Leithardt, Marko Beko, Cesar Albenes Zeferino, Wemerson Delcio Parreira
Format: Article
Language:English
Published: MDPI AG 2020-12-01
Series:Journal of Sensor and Actuator Networks
Subjects:
Online Access:https://www.mdpi.com/2224-2708/10/1/3

Similar Items