Computer Engineering & Science
Previous Articles Next Articles
WEI Guoheng1,2,WANG Ya2,ZHANG Huanguo1
Received:
Revised:
Online:
Published:
Abstract:
Aiming at the special applications of resource constrained devices such as RFID, we employ the elliptic curve algorithm with high security performance to improve the lightweight of point multiplication. We improve the modular multiplication and the inversion algorithm for the point multiplication in the core part, and redesign the algorithm execution structure by using the whole serial and partial parallel method. We implement the improved algorithm on FPGA, and experimental results show that it has obvious advantages in speed and chip occupied area, and is suitable for resource constrained applications such as RFID.
Key words: elliptic curve cryptography(ECC), radio frequency identification device (RFID), binary field, point multiplication
WEI Guoheng1,2,WANG Ya2,ZHANG Huanguo1.
0 / / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: http://joces.nudt.edu.cn/EN/
http://joces.nudt.edu.cn/EN/Y2017/V39/I01/81