This book is a step towards showing the practicability of Public Key Cryptography (PKC) and in particular Elliptic Curve Cryptography (ECC) on low-end constrained devices like sensor nodes and RF-ID chips. The book presents the flexibility that ECC provides in the choice of parameters and algorithms at different hierarchies for efficient implementations on constrained platforms like 8-bit micro-processors. Architectural enhancements with software/hardware co-design including instruction set extensions were investigated for low-level finite field arithmetic used in ECC. Finally, a highly area...
This book is a step towards showing the practicability of Public Key Cryptography (PKC) and in particular Elliptic Curve Cryptography (ECC) on low-end...