Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptography Implementation
<p class="Abstract"><span lang="EN-US">Implementing a secure cryptosystem requires operations involving hundreds of bits. One of the most recommended algorithm is Elliptic Curve Cryptography (ECC). The complexity of elliptic curve algorithms and parameters with hundre...
Main Authors: | Marisa W. Paryasto, Budi Rahardjo, Fajar Yuliawan, Intan Muchtadi Alamsyah, Kuspriyanto Kuspriyanto |
---|---|
Format: | Article |
Language: | English |
Published: |
ITB Journal Publisher
2013-09-01
|
Series: | Journal of ICT Research and Applications |
Online Access: | http://journals.itb.ac.id/index.php/jictra/article/view/221 |
Similar Items
-
Noise-based Stego-ECC
by: Rahardjo Budi, et al.
Published: (2014-03-01) -
Software elliptic curve cryptography
by: Khabbazian, Majid.
Published: (2008) -
Algorithms in Elliptic Curve Cryptography
by: Hutchinson, Aaron
Published: (2019) -
Elliptic Curves and their Applications to Cryptography
by: Bathgate, Jonathan
Published: (2007) -
Binary Edwards curves in elliptic curve cryptography
by: Enos, Graham
Published: (2013)