Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptography Implementation
<p class="Abstract"><span lang="EN-US">Implementing a secure cryptosystem requires operations involving hundreds of bits. One of the most recommended algorithm is Elliptic Curve Cryptography (ECC). The complexity of elliptic curve algorithms and parameters with hundre...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
ITB Journal Publisher
2013-09-01
|
Series: | Journal of ICT Research and Applications |
Online Access: | http://journals.itb.ac.id/index.php/jictra/article/view/221 |