Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptography Implementation

<p class="Abstract"><span lang="EN-US">Implementing a secure cryptosystem requires operations involving hundreds of bits. One of the most recommended algorithm is Elliptic Curve Cryptography (ECC). The complexity of elliptic curve algorithms and parameters with hundre...

Full description

Bibliographic Details
Main Authors: Marisa W. Paryasto, Budi Rahardjo, Fajar Yuliawan, Intan Muchtadi Alamsyah, Kuspriyanto Kuspriyanto
Format: Article
Language:English
Published: ITB Journal Publisher 2013-09-01
Series:Journal of ICT Research and Applications
Online Access:http://journals.itb.ac.id/index.php/jictra/article/view/221