Software Implementation of Curve Based Cryptography for Constrained Devices

Provided by: International Journal of Computer Applications
Topic: Security
Format: PDF
"Curve based cryptography are preferred for embedded hardware since they require shorter operand size than RSA to attain the same security level. So ECC and HECC are more suitable in constrained environment such as smart cards if the authors can select suitable curves and efficient scalar multiplication technique to speed up arithmetic on the curve. With this in view, this paper explores in details the main operations like scalar multiplication, group operations on Jacobian, finite field operations etc which are the prime steps for efficient implementation of ECC/HECC."

Find By Topic