Detailed Information

Cited 0 time in webofscience Cited 1 time in scopus
Metadata Downloads

Analysis of hardware modular inversion modules for elliptic curve cryptography

Full metadata record
DC Field Value Language
dc.contributor.authorChoi, Piljoo-
dc.contributor.authorKong, Jeong-Taek-
dc.contributor.authorKim, Dong Kyue-
dc.date.accessioned2021-08-02T17:35:48Z-
dc.date.available2021-08-02T17:35:48Z-
dc.date.created2021-05-13-
dc.date.issued2016-01-
dc.identifier.urihttps://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/24069-
dc.description.abstractElliptic Curve Cryptography (ECC), one of public-key cryptographic algorithms, is being widely used for device authentication. ECC need heavy computation, and especially modular inversion operation, one of main operations of ECC, is very time-consuming. To improve the performance, hardware implementation can be a solution. There are various modular inversion algorithms, and their performances in hardware module are different from those of software program. In this paper, we implemented various inversion algorithms in hardware, and analyzed them to find out which one is proper for hardware design.-
dc.language영어-
dc.language.isoen-
dc.publisherInstitute of Electrical and Electronics Engineers Inc.-
dc.titleAnalysis of hardware modular inversion modules for elliptic curve cryptography-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, Dong Kyue-
dc.identifier.doi10.1109/ISOCC.2015.7401713-
dc.identifier.scopusid2-s2.0-84963831453-
dc.identifier.bibliographicCitationISOCC 2015 - International SoC Design Conference: SoC for Internet of Everything (IoE), pp.313 - 314-
dc.relation.isPartOfISOCC 2015 - International SoC Design Conference: SoC for Internet of Everything (IoE)-
dc.citation.titleISOCC 2015 - International SoC Design Conference: SoC for Internet of Everything (IoE)-
dc.citation.startPage313-
dc.citation.endPage314-
dc.type.rimsART-
dc.type.docTypeConference Paper-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscopus-
dc.subject.keywordPlusAlgorithms-
dc.subject.keywordPlusCryptography-
dc.subject.keywordPlusGeometry-
dc.subject.keywordPlusPublic key cryptography-
dc.subject.keywordPlusReconfigurable hardware-
dc.subject.keywordPlusCryptographic algorithms-
dc.subject.keywordPlusElliptic curve cryptography-
dc.subject.keywordPlusElliptic Curve Cryptography(ECC)-
dc.subject.keywordPlusHardware implementations-
dc.subject.keywordPlusModular division-
dc.subject.keywordPlusModular inversion-
dc.subject.keywordPlusModular inversion algorithms-
dc.subject.keywordPlusModular inversion operations-
dc.subject.keywordPlusHardware-
dc.subject.keywordAuthorECC-
dc.subject.keywordAuthormodular division-
dc.subject.keywordAuthormodular inversion-
dc.identifier.urlhttps://ieeexplore.ieee.org/document/7401713-
Files in This Item
Go to Link
Appears in
Collections
서울 공과대학 > 서울 융합전자공학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kim, Dong Kyue photo

Kim, Dong Kyue
COLLEGE OF ENGINEERING (SCHOOL OF ELECTRONIC ENGINEERING)
Read more

Altmetrics

Total Views & Downloads

BROWSE