透過您的圖書館登入
IP:13.59.61.119

並列摘要


Elliptic Curve Cryptography (ECC) is a promising alternative for public-key algorithms in resource-constrained systems because it provides a similar level of security with much shorter keys than conventional integer-based public-key algorithms. ECC over binary field is of special interest because the operations in binary field are thought more space and time efficient. However, the software implementations of ECC over binary field are still slow, especially on low-end processors used in small computing devices such as sensor nodes. In this paper, we studied software implementations of ECC. We first investigated whether some architectural parameters such as word size may affect the choice of algorithms when implementing ECC with software. We identified a set of algorithms for ECC implementation for low-end processors. We also examined several improvements to the instruction set architecture of an 8-bit processor and studied their impact on the performance of ECC.

被引用紀錄


Liu, H. H. (2016). 節能之水下網路機率式路由設計 [doctoral dissertation, National Taiwan University]. Airiti Library. https://doi.org/10.6342/NTU201602072
Jhao, Y. L. (2012). DEH:Dynamic Extensible Two-way Honeypot [master's thesis, National Central University]. Airiti Library. https://www.airitilibrary.com/Article/Detail?DocID=U0031-1903201314445098

延伸閱讀